<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Craig+Smith</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Craig+Smith"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Craig_Smith"/>
		<updated>2026-04-26T11:53:02Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=241010</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=241010"/>
				<updated>2018-05-30T01:41:21Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Get Involved!==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Project is currently reviewing the Top Ten list for 2018. Provide your insight and expertise by joining the #iot-security channel meetups on Slack.&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Attack_Surface_Areas IoT Attack Surface Areas]&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The OWASP Slack Channel]&lt;br /&gt;
&lt;br /&gt;
Hint: If you're new to Slack, [https://lists.owasp.org/pipermail/owasp-community/2015-July/000703.html join OWASP's slack channel first], then join #iot-security within OWASP's channel.&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://1drv.ms/v/s!AucQMYXJNefdwAwa5IPz2cg3cvWe OWASP IoT 2018 Planning Session]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/7b/IoT_Preso_v1.pptx Quick discussion on IoT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [https://1drv.ms/v/s!AucQMYXJNefdwAwa5IPz2cg3cvWe OWASP IoT 2018 Planning Session]&lt;br /&gt;
* Added a [https://owasp-iot-security.slack.com/ Slack channel]&lt;br /&gt;
* Added a sub-project; [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Security_Policy_Project IoT Security Policy Project]&lt;br /&gt;
* Daniel Miessler gave his [https://www.youtube.com/watch?v=RhxHHD790nw IoT talk at DEFCON 23]&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
** UART (Serial)&lt;br /&gt;
** JTAG / SWD&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure ([[Top 10 2013-A6-Sensitive Data Exposure|See OWASP Top 10 - A6 Sensitive data exposure]]):&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
** Verify for old sw versions and possible attacks (Heartbleed, Shellshock, old PHP versions etc)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade possibility&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Firmware loaded over insecure channel (no TLS)&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Check for insecure direct object references&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damage (Physicall)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
* Usage of pre-programmed default passwords&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping or tampering  by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware and storage extraction'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://www.flashrom.org/Flashrom In-Situ dumping]&lt;br /&gt;
* Intercepting a OTA update&lt;br /&gt;
* Downloading from the manufacturers web page&lt;br /&gt;
* [https://www.exploitee.rs/index.php/Exploitee.rs_Low_Voltage_e-MMC_Adapter eMMC tapping]&lt;br /&gt;
* Unsoldering the SPI Flash / eMMC chip and reading it in a adapter&lt;br /&gt;
|&lt;br /&gt;
* Firmware contains a lot of useful information, like source code and binaries of running services, pre-set passwords, ssh keys etc.  &lt;br /&gt;
|-&lt;br /&gt;
| '''Manipulating the code execution flow of the device'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://wiki.newae.com/Main_Page Side channel attacks like glitching]&lt;br /&gt;
|&lt;br /&gt;
* With the help of a JTAG adapter and gdb we can modify the execution of firmware in the device and bypass almost all software based security controls.&lt;br /&gt;
* Side channel attacks can also modify the execution flow or can be used to leak interesting information from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Obtaining console access'''&lt;br /&gt;
|&lt;br /&gt;
* Serial interfaces (SPI / UART)&lt;br /&gt;
|&lt;br /&gt;
* By connecting to a serial interface, we will obtain full console access to a device&lt;br /&gt;
* Usually security measures include custom bootloaders that prevent the attacker from entering single user mode, but that can also be bypassed.&lt;br /&gt;
|-&lt;br /&gt;
| '''Insecure 3rd party components'''&lt;br /&gt;
|&lt;br /&gt;
* Software&lt;br /&gt;
|&lt;br /&gt;
* Out of date versions of busybox, openssl, ssh, web servers, etc.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Medical Devices =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Medical Device Testing ==&lt;br /&gt;
&lt;br /&gt;
The Medical Device Testing project is intended to provide some basic attack surface considerations that should be evaluated before shipping Medical Device equipment.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''HL7'''&lt;br /&gt;
|&lt;br /&gt;
* XML Parsing&lt;br /&gt;
** XSS&lt;br /&gt;
* Information Disclosure&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure:&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Data Flow'''&lt;br /&gt;
|&lt;br /&gt;
* What data is being captured?&lt;br /&gt;
* How does it move within the ecosystem?&lt;br /&gt;
* How is it protected in transit?&lt;br /&gt;
* How is it protected at rest?&lt;br /&gt;
* Who is that data shared with?&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
* Failure state analysis&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Medical Attack Surfaces project? ==&lt;br /&gt;
&lt;br /&gt;
The Medical Attack Surfaces project provides:&lt;br /&gt;
&lt;br /&gt;
* A simple way for testers, manufacturers, developers, and users to get an understanding of the complexity of a modern medical environment&lt;br /&gt;
* Allows people to visualize the numerous attack surfaces that need to be defended within medical equipment ecosystems&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Daniel Miessler presented on using Adaptive Testing Methodologies to evaluate the security of medical devices at RSA 2017.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilities&lt;br /&gt;
|&lt;br /&gt;
* Out-of-date core components&lt;br /&gt;
* Unsupported core components&lt;br /&gt;
* Expired and/or self-signed certificates&lt;br /&gt;
* Same certificate used on multiple devices&lt;br /&gt;
* Admin web interface concerns&lt;br /&gt;
* Hardcoded or easy to guess credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption key exposure&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Manufacturer Recommendations&lt;br /&gt;
|&lt;br /&gt;
* Ensure that supported and up-to-date software is used by developers&lt;br /&gt;
* Ensure that robust update mechanisms are in place for devices&lt;br /&gt;
* Ensure that certificates are not duplicated across devices and product lines.&lt;br /&gt;
* Ensure supported and up-to-date software is used by developers&lt;br /&gt;
* Develop a mechanism to ensure a new certificate is installed when old ones expire&lt;br /&gt;
* Disable deprecated SSL versions&lt;br /&gt;
* Ensure developers do not code in easy to guess or common admin passwords&lt;br /&gt;
* Ensure services such as SSH have a secure password created&lt;br /&gt;
* Develop a mechanism that requires the user to create a secure admin password during initial device setup&lt;br /&gt;
* Ensure developers do not hard code passwords or hashes&lt;br /&gt;
* Have source code reviewed by a third party before releasing device to production&lt;br /&gt;
* Ensure industry standard encryption or strong hashing is used&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Event Logging Project=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:                   OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Logging Events==&lt;br /&gt;
&lt;br /&gt;
This is a working draft of the recommended minimum IoT Device logging events. This includes many   different types of devices, including consumer IoT, enterprise IoT, and ICS/SCADA type devices.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Event Category&lt;br /&gt;
! Events&lt;br /&gt;
|-&lt;br /&gt;
| '''Request Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
* Unexpected Quantity of Characters in Parameter&lt;br /&gt;
* Unexpected Type of Characters in Parameter&lt;br /&gt;
|-&lt;br /&gt;
| '''Authentication Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Multiple Failed Passwords&lt;br /&gt;
* High Rate of Login Attempts&lt;br /&gt;
* Additional POST Variable&lt;br /&gt;
* Deviation from Normal GEO Location&lt;br /&gt;
|-&lt;br /&gt;
| '''Session Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying the Existing Cookie&lt;br /&gt;
* Substituting Another User's Valid SessionID or Cookie&lt;br /&gt;
* Source Location Changes During Session&lt;br /&gt;
|-&lt;br /&gt;
| '''Access Control Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
* Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
* Forced Browsing Attempt&lt;br /&gt;
|-&lt;br /&gt;
| '''Ecosystem Membership Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Traffic Seen from Disenrolled System&lt;br /&gt;
* Traffic Seen from Unenrolled System&lt;br /&gt;
* Failed Attempt to Enroll in Ecosystem&lt;br /&gt;
* Multiple Attempts to Enroll in Ecosystem&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Access Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Case Tampering Detected&lt;br /&gt;
* Device Logic Board Tampering Detected&lt;br /&gt;
|-&lt;br /&gt;
| '''Administrative Mode Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Entered Administrative Mode&lt;br /&gt;
* Device Accessed Using Default Administrative Credentials&lt;br /&gt;
|-&lt;br /&gt;
| '''Input Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Double Encoded Character&lt;br /&gt;
* Unexpected Encoding Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Command Injection Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
* Abnormal Quantity of Returned Records&lt;br /&gt;
|-&lt;br /&gt;
| '''Honey Trap Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Honey Trap Resource Requested&lt;br /&gt;
* Honey Trap Data Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Reputation Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Suspicious or Disallowed User Source Location&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:  25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Logging Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Secure Logging Project provides a list of core events that should be logged in any IoT-related system. The project exists because IoT systems in general are not logging nearly enough events to constitute input for a solid detection and response program around IoT devices, and for companies that want to do this there are not many good resources for what should be logged.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSensor_Project The OWASP AppSensor Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/iot-this-week/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=240064</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=240064"/>
				<updated>2018-04-19T18:46:32Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Get Involved!==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Project is currently reviewing the Top Ten list for 2018. Provide your insight and expertise by joining the #iot-security channel meetups on Slack.&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Attack_Surface_Areas IoT Attack Surface Areas]&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The OWASP Slack Channel]&lt;br /&gt;
&lt;br /&gt;
Hint: If you're new to Slack, [https://lists.owasp.org/pipermail/owasp-community/2015-July/000703.html join OWASP's slack channel first], then join #iot-security within OWASP's channel.&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://1drv.ms/v/s!AucQMYXJNefdwAwa5IPz2cg3cvWe OWASP IoT 2018 Planning Session]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/7b/IoT_Preso_v1.pptx Quick discussion on IoT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [https://1drv.ms/v/s!AucQMYXJNefdwAwa5IPz2cg3cvWe OWASP IoT 2018 Planning Session]&lt;br /&gt;
* Added a [https://owasp-iot-security.slack.com/ Slack channel]&lt;br /&gt;
* Added a sub-project; [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Security_Policy_Project IoT Security Policy Project]&lt;br /&gt;
* Daniel Miessler gave his [https://www.youtube.com/watch?v=RhxHHD790nw IoT talk at DEFCON 23]&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
** UART (Serial)&lt;br /&gt;
** JTAG / SWD&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure ([[Top 10 2013-A6-Sensitive Data Exposure|See OWASP Top 10 - A6 Sensitive data exposure]]):&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
** Verify for old sw versions and possible attacks (Heartbleed, Shellshock, old PHP versions etc)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade possibility&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Firmware loaded over insecure channel (no TLS)&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Check for insecure direct object references&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damage (Physicall)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
* Usage of pre-programmed default passwords&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping or tampering  by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware and storage extraction'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://www.flashrom.org/Flashrom In-Situ dumping]&lt;br /&gt;
* Intercepting a OTA update&lt;br /&gt;
* Downloading from the manufacturers web page&lt;br /&gt;
* [https://www.exploitee.rs/index.php/Exploitee.rs_Low_Voltage_e-MMC_Adapter eMMC tapping]&lt;br /&gt;
* Unsoldering the SPI Flash / eMMC chip and reading it in a adapter&lt;br /&gt;
|&lt;br /&gt;
* Firmware contains a lot of useful information, like source code and binaries of running services, pre-set passwords, ssh keys etc.  &lt;br /&gt;
|-&lt;br /&gt;
| '''Manipulating the code execution flow of the device'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://wiki.newae.com/Main_Page Side channel attacks like glitching]&lt;br /&gt;
|&lt;br /&gt;
* With the help of a JTAG adapter and gdb we can modify the execution of firmware in the device and bypass almost all software based security controls.&lt;br /&gt;
* Side channel attacks can also modify the execution flow or can be used to leak interesting information from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Obtaining console access'''&lt;br /&gt;
|&lt;br /&gt;
* Serial interfaces (SPI / UART)&lt;br /&gt;
|&lt;br /&gt;
* By connecting to a serial interface, we will obtain full console access to a device&lt;br /&gt;
* Usually security measures include custom bootloaders that prevent the attacker from entering single user mode, but that can also be bypassed.&lt;br /&gt;
|-&lt;br /&gt;
| '''Insecure 3rd party components'''&lt;br /&gt;
|&lt;br /&gt;
* Software&lt;br /&gt;
|&lt;br /&gt;
* Out of date versions of busybox, openssl, ssh, web servers, etc.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Medical Devices =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Medical Device Testing ==&lt;br /&gt;
&lt;br /&gt;
The Medical Device Testing project is intended to provide some basic attack surface considerations that should be evaluated before shipping Medical Device equipment.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''HL7'''&lt;br /&gt;
|&lt;br /&gt;
* XML Parsing&lt;br /&gt;
** XSS&lt;br /&gt;
* Information Disclosure&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure:&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Data Flow'''&lt;br /&gt;
|&lt;br /&gt;
* What data is being captured?&lt;br /&gt;
* How does it move within the ecosystem?&lt;br /&gt;
* How is it protected in transit?&lt;br /&gt;
* How is it protected at rest?&lt;br /&gt;
* Who is that data shared with?&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
* Failure state analysis&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Medical Attack Surfaces project? ==&lt;br /&gt;
&lt;br /&gt;
The Medical Attack Surfaces project provides:&lt;br /&gt;
&lt;br /&gt;
* A simple way for testers, manufacturers, developers, and users to get an understanding of the complexity of a modern medical environment&lt;br /&gt;
* Allows people to visualize the numerous attack surfaces that need to be defended within medical equipment ecosystems&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Daniel Miessler presented on using Adaptive Testing Methodologies to evaluate the security of medical devices at RSA 2017.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilities&lt;br /&gt;
|&lt;br /&gt;
* Out-of-date core components&lt;br /&gt;
* Unsupported core components&lt;br /&gt;
* Expired and/or self-signed certificates&lt;br /&gt;
* Same certificate used on multiple devices&lt;br /&gt;
* Admin web interface concerns&lt;br /&gt;
* Hardcoded or easy to guess credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption key exposure&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Manufacturer Recommendations&lt;br /&gt;
|&lt;br /&gt;
* Ensure that supported and up-to-date software is used by developers&lt;br /&gt;
* Ensure that robust update mechanisms are in place for devices&lt;br /&gt;
* Ensure that certificates are not duplicated across devices and product lines.&lt;br /&gt;
* Ensure supported and up-to-date software is used by developers&lt;br /&gt;
* Develop a mechanism to ensure a new certificate is installed when old ones expire&lt;br /&gt;
* Disable deprecated SSL versions&lt;br /&gt;
* Ensure developers do not code in easy to guess or common admin passwords&lt;br /&gt;
* Ensure services such as SSH have a secure password created&lt;br /&gt;
* Develop a mechanism that requires the user to create a secure admin password during initial device setup&lt;br /&gt;
* Ensure developers do not hard code passwords or hashes&lt;br /&gt;
* Have source code reviewed by a third party before releasing device to production&lt;br /&gt;
* Ensure industry standard encryption or strong hashing is used&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Event Logging Project=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:                   OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Logging Events==&lt;br /&gt;
&lt;br /&gt;
This is a working draft of the recommended minimum IoT Device logging events. This includes many   different types of devices, including consumer IoT, enterprise IoT, and ICS/SCADA type devices.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Event Category&lt;br /&gt;
! Events&lt;br /&gt;
|-&lt;br /&gt;
| '''Request Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
* Unexpected Quantity of Characters in Parameter&lt;br /&gt;
* Unexpected Type of Characters in Parameter&lt;br /&gt;
|-&lt;br /&gt;
| '''Authentication Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Multiple Failed Passwords&lt;br /&gt;
* High Rate of Login Attempts&lt;br /&gt;
* Additional POST Variable&lt;br /&gt;
* Deviation from Normal GEO Location&lt;br /&gt;
|-&lt;br /&gt;
| '''Session Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying the Existing Cookie&lt;br /&gt;
* Substituting Another User's Valid SessionID or Cookie&lt;br /&gt;
* Source Location Changes During Session&lt;br /&gt;
|-&lt;br /&gt;
| '''Access Control Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
* Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
* Forced Browsing Attempt&lt;br /&gt;
|-&lt;br /&gt;
| '''Ecosystem Membership Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Traffic Seen from Disenrolled System&lt;br /&gt;
* Traffic Seen from Unenrolled System&lt;br /&gt;
* Failed Attempt to Enroll in Ecosystem&lt;br /&gt;
* Multiple Attempts to Enroll in Ecosystem&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Access Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Case Tampering Detected&lt;br /&gt;
* Device Logic Board Tampering Detected&lt;br /&gt;
|-&lt;br /&gt;
| '''Administrative Mode Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Entered Administrative Mode&lt;br /&gt;
* Device Accessed Using Default Administrative Credentials&lt;br /&gt;
|-&lt;br /&gt;
| '''Input Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Double Encoded Character&lt;br /&gt;
* Unexpected Encoding Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Command Injection Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
* Abnormal Quantity of Returned Records&lt;br /&gt;
|-&lt;br /&gt;
| '''Honey Trap Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Honey Trap Resource Requested&lt;br /&gt;
* Honey Trap Data Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Reputation Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Suspicious or Disallowed User Source Location&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:  25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Logging Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Secure Logging Project provides a list of core events that should be logged in any IoT-related system. The project exists because IoT systems in general are not logging nearly enough events to constitute input for a solid detection and response program around IoT devices, and for companies that want to do this there are not many good resources for what should be logged.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSensor_Project The OWASP AppSensor Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Security Policy Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Policy Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Policies Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/iot-this-week/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=240063</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=240063"/>
				<updated>2018-04-19T18:45:55Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: Added Get Involved paragraph.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Get Involved!==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Project is currently reviewing the Top Ten list for 2018. Provide your insight and expertise by joining the #iot-security channel meetups.&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Attack_Surface_Areas IoT Attack Surface Areas]&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The OWASP Slack Channel]&lt;br /&gt;
&lt;br /&gt;
Hint: If you're new to Slack, [https://lists.owasp.org/pipermail/owasp-community/2015-July/000703.html join OWASP's slack channel first], then join #iot-security within OWASP's channel.&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://1drv.ms/v/s!AucQMYXJNefdwAwa5IPz2cg3cvWe OWASP IoT 2018 Planning Session]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/7b/IoT_Preso_v1.pptx Quick discussion on IoT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [https://1drv.ms/v/s!AucQMYXJNefdwAwa5IPz2cg3cvWe OWASP IoT 2018 Planning Session]&lt;br /&gt;
* Added a [https://owasp-iot-security.slack.com/ Slack channel]&lt;br /&gt;
* Added a sub-project; [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Security_Policy_Project IoT Security Policy Project]&lt;br /&gt;
* Daniel Miessler gave his [https://www.youtube.com/watch?v=RhxHHD790nw IoT talk at DEFCON 23]&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
** UART (Serial)&lt;br /&gt;
** JTAG / SWD&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure ([[Top 10 2013-A6-Sensitive Data Exposure|See OWASP Top 10 - A6 Sensitive data exposure]]):&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
** Verify for old sw versions and possible attacks (Heartbleed, Shellshock, old PHP versions etc)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade possibility&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Firmware loaded over insecure channel (no TLS)&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Check for insecure direct object references&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damage (Physicall)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
* Usage of pre-programmed default passwords&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping or tampering  by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware and storage extraction'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://www.flashrom.org/Flashrom In-Situ dumping]&lt;br /&gt;
* Intercepting a OTA update&lt;br /&gt;
* Downloading from the manufacturers web page&lt;br /&gt;
* [https://www.exploitee.rs/index.php/Exploitee.rs_Low_Voltage_e-MMC_Adapter eMMC tapping]&lt;br /&gt;
* Unsoldering the SPI Flash / eMMC chip and reading it in a adapter&lt;br /&gt;
|&lt;br /&gt;
* Firmware contains a lot of useful information, like source code and binaries of running services, pre-set passwords, ssh keys etc.  &lt;br /&gt;
|-&lt;br /&gt;
| '''Manipulating the code execution flow of the device'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://wiki.newae.com/Main_Page Side channel attacks like glitching]&lt;br /&gt;
|&lt;br /&gt;
* With the help of a JTAG adapter and gdb we can modify the execution of firmware in the device and bypass almost all software based security controls.&lt;br /&gt;
* Side channel attacks can also modify the execution flow or can be used to leak interesting information from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Obtaining console access'''&lt;br /&gt;
|&lt;br /&gt;
* Serial interfaces (SPI / UART)&lt;br /&gt;
|&lt;br /&gt;
* By connecting to a serial interface, we will obtain full console access to a device&lt;br /&gt;
* Usually security measures include custom bootloaders that prevent the attacker from entering single user mode, but that can also be bypassed.&lt;br /&gt;
|-&lt;br /&gt;
| '''Insecure 3rd party components'''&lt;br /&gt;
|&lt;br /&gt;
* Software&lt;br /&gt;
|&lt;br /&gt;
* Out of date versions of busybox, openssl, ssh, web servers, etc.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Medical Devices =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Medical Device Testing ==&lt;br /&gt;
&lt;br /&gt;
The Medical Device Testing project is intended to provide some basic attack surface considerations that should be evaluated before shipping Medical Device equipment.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''HL7'''&lt;br /&gt;
|&lt;br /&gt;
* XML Parsing&lt;br /&gt;
** XSS&lt;br /&gt;
* Information Disclosure&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure:&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Data Flow'''&lt;br /&gt;
|&lt;br /&gt;
* What data is being captured?&lt;br /&gt;
* How does it move within the ecosystem?&lt;br /&gt;
* How is it protected in transit?&lt;br /&gt;
* How is it protected at rest?&lt;br /&gt;
* Who is that data shared with?&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
* Failure state analysis&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Medical Attack Surfaces project? ==&lt;br /&gt;
&lt;br /&gt;
The Medical Attack Surfaces project provides:&lt;br /&gt;
&lt;br /&gt;
* A simple way for testers, manufacturers, developers, and users to get an understanding of the complexity of a modern medical environment&lt;br /&gt;
* Allows people to visualize the numerous attack surfaces that need to be defended within medical equipment ecosystems&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Daniel Miessler presented on using Adaptive Testing Methodologies to evaluate the security of medical devices at RSA 2017.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilities&lt;br /&gt;
|&lt;br /&gt;
* Out-of-date core components&lt;br /&gt;
* Unsupported core components&lt;br /&gt;
* Expired and/or self-signed certificates&lt;br /&gt;
* Same certificate used on multiple devices&lt;br /&gt;
* Admin web interface concerns&lt;br /&gt;
* Hardcoded or easy to guess credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption key exposure&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Manufacturer Recommendations&lt;br /&gt;
|&lt;br /&gt;
* Ensure that supported and up-to-date software is used by developers&lt;br /&gt;
* Ensure that robust update mechanisms are in place for devices&lt;br /&gt;
* Ensure that certificates are not duplicated across devices and product lines.&lt;br /&gt;
* Ensure supported and up-to-date software is used by developers&lt;br /&gt;
* Develop a mechanism to ensure a new certificate is installed when old ones expire&lt;br /&gt;
* Disable deprecated SSL versions&lt;br /&gt;
* Ensure developers do not code in easy to guess or common admin passwords&lt;br /&gt;
* Ensure services such as SSH have a secure password created&lt;br /&gt;
* Develop a mechanism that requires the user to create a secure admin password during initial device setup&lt;br /&gt;
* Ensure developers do not hard code passwords or hashes&lt;br /&gt;
* Have source code reviewed by a third party before releasing device to production&lt;br /&gt;
* Ensure industry standard encryption or strong hashing is used&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Event Logging Project=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:                   OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Logging Events==&lt;br /&gt;
&lt;br /&gt;
This is a working draft of the recommended minimum IoT Device logging events. This includes many   different types of devices, including consumer IoT, enterprise IoT, and ICS/SCADA type devices.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Event Category&lt;br /&gt;
! Events&lt;br /&gt;
|-&lt;br /&gt;
| '''Request Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
* Unexpected Quantity of Characters in Parameter&lt;br /&gt;
* Unexpected Type of Characters in Parameter&lt;br /&gt;
|-&lt;br /&gt;
| '''Authentication Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Multiple Failed Passwords&lt;br /&gt;
* High Rate of Login Attempts&lt;br /&gt;
* Additional POST Variable&lt;br /&gt;
* Deviation from Normal GEO Location&lt;br /&gt;
|-&lt;br /&gt;
| '''Session Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying the Existing Cookie&lt;br /&gt;
* Substituting Another User's Valid SessionID or Cookie&lt;br /&gt;
* Source Location Changes During Session&lt;br /&gt;
|-&lt;br /&gt;
| '''Access Control Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
* Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
* Forced Browsing Attempt&lt;br /&gt;
|-&lt;br /&gt;
| '''Ecosystem Membership Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Traffic Seen from Disenrolled System&lt;br /&gt;
* Traffic Seen from Unenrolled System&lt;br /&gt;
* Failed Attempt to Enroll in Ecosystem&lt;br /&gt;
* Multiple Attempts to Enroll in Ecosystem&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Access Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Case Tampering Detected&lt;br /&gt;
* Device Logic Board Tampering Detected&lt;br /&gt;
|-&lt;br /&gt;
| '''Administrative Mode Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Entered Administrative Mode&lt;br /&gt;
* Device Accessed Using Default Administrative Credentials&lt;br /&gt;
|-&lt;br /&gt;
| '''Input Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Double Encoded Character&lt;br /&gt;
* Unexpected Encoding Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Command Injection Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
* Abnormal Quantity of Returned Records&lt;br /&gt;
|-&lt;br /&gt;
| '''Honey Trap Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Honey Trap Resource Requested&lt;br /&gt;
* Honey Trap Data Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Reputation Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Suspicious or Disallowed User Source Location&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:  25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Logging Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Secure Logging Project provides a list of core events that should be logged in any IoT-related system. The project exists because IoT systems in general are not logging nearly enough events to constitute input for a solid detection and response program around IoT devices, and for companies that want to do this there are not many good resources for what should be logged.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSensor_Project The OWASP AppSensor Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Security Policy Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Policy Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Policies Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/iot-this-week/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=238542</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=238542"/>
				<updated>2018-03-12T20:59:27Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Attack_Surface_Areas IoT Attack Surface Areas]&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The OWASP Slack Channel]&lt;br /&gt;
&lt;br /&gt;
Hint: If you're new to Slack, [https://lists.owasp.org/pipermail/owasp-community/2015-July/000703.html join OWASP's slack channel first], then join #iot-security within OWASP's channel.&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://1drv.ms/v/s!AucQMYXJNefdwAwa5IPz2cg3cvWe OWASP IoT 2018 Planning Session]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/7b/IoT_Preso_v1.pptx Quick discussion on IoT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [https://1drv.ms/v/s!AucQMYXJNefdwAwa5IPz2cg3cvWe OWASP IoT 2018 Planning Session]&lt;br /&gt;
* Added a [https://owasp-iot-security.slack.com/ Slack channel]&lt;br /&gt;
* Added a sub-project; [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Security_Policy_Project IoT Security Policy Project]&lt;br /&gt;
* Daniel Miessler gave his [https://www.youtube.com/watch?v=RhxHHD790nw IoT talk at DEFCON 23]&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
** UART (Serial)&lt;br /&gt;
** JTAG / SWD&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure ([[Top 10 2013-A6-Sensitive Data Exposure|See OWASP Top 10 - A6 Sensitive data exposure]]):&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
** Verify for old sw versions and possible attacks (Heartbleed, Shellshock, old PHP versions etc)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade possibility&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Firmware loaded over insecure channel (no TLS)&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Check for insecure direct object references&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damage (Physicall)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
* Usage of pre-programmed default passwords&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping or tampering  by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware and storage extraction'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://www.flashrom.org/Flashrom In-Situ dumping]&lt;br /&gt;
* Intercepting a OTA update&lt;br /&gt;
* Downloading from the manufacturers web page&lt;br /&gt;
* [https://www.exploitee.rs/index.php/Exploitee.rs_Low_Voltage_e-MMC_Adapter eMMC tapping]&lt;br /&gt;
* Unsoldering the SPI Flash / eMMC chip and reading it in a adapter&lt;br /&gt;
|&lt;br /&gt;
* Firmware contains a lot of useful information, like source code and binaries of running services, pre-set passwords, ssh keys etc.  &lt;br /&gt;
|-&lt;br /&gt;
| '''Manipulating the code execution flow of the device'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://wiki.newae.com/Main_Page Side channel attacks like glitching]&lt;br /&gt;
|&lt;br /&gt;
* With the help of a JTAG adapter and gdb we can modify the execution of firmware in the device and bypass almost all software based security controls.&lt;br /&gt;
* Side channel attacks can also modify the execution flow or can be used to leak interesting information from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Obtaining console access'''&lt;br /&gt;
|&lt;br /&gt;
* Serial interfaces (SPI / UART)&lt;br /&gt;
|&lt;br /&gt;
* By connecting to a serial interface, we will obtain full console access to a device&lt;br /&gt;
* Usually security measures include custom bootloaders that prevent the attacker from entering single user mode, but that can also be bypassed.&lt;br /&gt;
|-&lt;br /&gt;
| '''Insecure 3rd party components'''&lt;br /&gt;
|&lt;br /&gt;
* Software&lt;br /&gt;
|&lt;br /&gt;
* Out of date versions of busybox, openssl, ssh, web servers, etc.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Medical Devices =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Medical Device Testing ==&lt;br /&gt;
&lt;br /&gt;
The Medical Device Testing project is intended to provide some basic attack surface considerations that should be evaluated before shipping Medical Device equipment.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''HL7'''&lt;br /&gt;
|&lt;br /&gt;
* XML Parsing&lt;br /&gt;
** XSS&lt;br /&gt;
* Information Disclosure&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure:&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Data Flow'''&lt;br /&gt;
|&lt;br /&gt;
* What data is being captured?&lt;br /&gt;
* How does it move within the ecosystem?&lt;br /&gt;
* How is it protected in transit?&lt;br /&gt;
* How is it protected at rest?&lt;br /&gt;
* Who is that data shared with?&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
* Failure state analysis&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Medical Attack Surfaces project? ==&lt;br /&gt;
&lt;br /&gt;
The Medical Attack Surfaces project provides:&lt;br /&gt;
&lt;br /&gt;
* A simple way for testers, manufacturers, developers, and users to get an understanding of the complexity of a modern medical environment&lt;br /&gt;
* Allows people to visualize the numerous attack surfaces that need to be defended within medical equipment ecosystems&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Daniel Miessler presented on using Adaptive Testing Methodologies to evaluate the security of medical devices at RSA 2017.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilities&lt;br /&gt;
|&lt;br /&gt;
* Out-of-date core components&lt;br /&gt;
* Unsupported core components&lt;br /&gt;
* Expired and/or self-signed certificates&lt;br /&gt;
* Same certificate used on multiple devices&lt;br /&gt;
* Admin web interface concerns&lt;br /&gt;
* Hardcoded or easy to guess credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption key exposure&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Manufacturer Recommendations&lt;br /&gt;
|&lt;br /&gt;
* Ensure that supported and up-to-date software is used by developers&lt;br /&gt;
* Ensure that robust update mechanisms are in place for devices&lt;br /&gt;
* Ensure that certificates are not duplicated across devices and product lines.&lt;br /&gt;
* Ensure supported and up-to-date software is used by developers&lt;br /&gt;
* Develop a mechanism to ensure a new certificate is installed when old ones expire&lt;br /&gt;
* Disable deprecated SSL versions&lt;br /&gt;
* Ensure developers do not code in easy to guess or common admin passwords&lt;br /&gt;
* Ensure services such as SSH have a secure password created&lt;br /&gt;
* Develop a mechanism that requires the user to create a secure admin password during initial device setup&lt;br /&gt;
* Ensure developers do not hard code passwords or hashes&lt;br /&gt;
* Have source code reviewed by a third party before releasing device to production&lt;br /&gt;
* Ensure industry standard encryption or strong hashing is used&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Event Logging Project=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:                   OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Logging Events==&lt;br /&gt;
&lt;br /&gt;
This is a working draft of the recommended minimum IoT Device logging events. This includes many   different types of devices, including consumer IoT, enterprise IoT, and ICS/SCADA type devices.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Event Category&lt;br /&gt;
! Events&lt;br /&gt;
|-&lt;br /&gt;
| '''Request Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
* Unexpected Quantity of Characters in Parameter&lt;br /&gt;
* Unexpected Type of Characters in Parameter&lt;br /&gt;
|-&lt;br /&gt;
| '''Authentication Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Multiple Failed Passwords&lt;br /&gt;
* High Rate of Login Attempts&lt;br /&gt;
* Additional POST Variable&lt;br /&gt;
* Deviation from Normal GEO Location&lt;br /&gt;
|-&lt;br /&gt;
| '''Session Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying the Existing Cookie&lt;br /&gt;
* Substituting Another User's Valid SessionID or Cookie&lt;br /&gt;
* Source Location Changes During Session&lt;br /&gt;
|-&lt;br /&gt;
| '''Access Control Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
* Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
* Forced Browsing Attempt&lt;br /&gt;
|-&lt;br /&gt;
| '''Ecosystem Membership Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Traffic Seen from Disenrolled System&lt;br /&gt;
* Traffic Seen from Unenrolled System&lt;br /&gt;
* Failed Attempt to Enroll in Ecosystem&lt;br /&gt;
* Multiple Attempts to Enroll in Ecosystem&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Access Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Case Tampering Detected&lt;br /&gt;
* Device Logic Board Tampering Detected&lt;br /&gt;
|-&lt;br /&gt;
| '''Administrative Mode Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Entered Administrative Mode&lt;br /&gt;
* Device Accessed Using Default Administrative Credentials&lt;br /&gt;
|-&lt;br /&gt;
| '''Input Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Double Encoded Character&lt;br /&gt;
* Unexpected Encoding Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Command Injection Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
* Abnormal Quantity of Returned Records&lt;br /&gt;
|-&lt;br /&gt;
| '''Honey Trap Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Honey Trap Resource Requested&lt;br /&gt;
* Honey Trap Data Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Reputation Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Suspicious or Disallowed User Source Location&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:  25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Logging Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Secure Logging Project provides a list of core events that should be logged in any IoT-related system. The project exists because IoT systems in general are not logging nearly enough events to constitute input for a solid detection and response program around IoT devices, and for companies that want to do this there are not many good resources for what should be logged.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSensor_Project The OWASP AppSensor Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Security Policy Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Policy Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Policies Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/iot-this-week/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=238541</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=238541"/>
				<updated>2018-03-12T20:33:22Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Attack_Surface_Areas IoT Attack Surface Areas]&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The OWASP Slack Channel]&lt;br /&gt;
&lt;br /&gt;
Hint: If you're new to Slack, [https://lists.owasp.org/pipermail/owasp-community/2015-July/000703.html join OWASP's slack channel first], then join #iot-security within OWASP's channel.&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://1drv.ms/v/s!AucQMYXJNefdwAwa5IPz2cg3cvWe OWASP IoT 2018 Planning Session]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/7b/IoT_Preso_v1.pptx Quick discussion on IoT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added a [https://owasp-iot-security.slack.com/ Slack channel]&lt;br /&gt;
* Added a sub-project; [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Security_Policy_Project IoT Security Policy Project]&lt;br /&gt;
* Daniel Miessler gave his [https://www.youtube.com/watch?v=RhxHHD790nw IoT talk at DEFCON 23]&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
** UART (Serial)&lt;br /&gt;
** JTAG / SWD&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure ([[Top 10 2013-A6-Sensitive Data Exposure|See OWASP Top 10 - A6 Sensitive data exposure]]):&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
** Verify for old sw versions and possible attacks (Heartbleed, Shellshock, old PHP versions etc)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade possibility&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Firmware loaded over insecure channel (no TLS)&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Check for insecure direct object references&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damage (Physicall)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
* Usage of pre-programmed default passwords&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping or tampering  by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware and storage extraction'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://www.flashrom.org/Flashrom In-Situ dumping]&lt;br /&gt;
* Intercepting a OTA update&lt;br /&gt;
* Downloading from the manufacturers web page&lt;br /&gt;
* [https://www.exploitee.rs/index.php/Exploitee.rs_Low_Voltage_e-MMC_Adapter eMMC tapping]&lt;br /&gt;
* Unsoldering the SPI Flash / eMMC chip and reading it in a adapter&lt;br /&gt;
|&lt;br /&gt;
* Firmware contains a lot of useful information, like source code and binaries of running services, pre-set passwords, ssh keys etc.  &lt;br /&gt;
|-&lt;br /&gt;
| '''Manipulating the code execution flow of the device'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://wiki.newae.com/Main_Page Side channel attacks like glitching]&lt;br /&gt;
|&lt;br /&gt;
* With the help of a JTAG adapter and gdb we can modify the execution of firmware in the device and bypass almost all software based security controls.&lt;br /&gt;
* Side channel attacks can also modify the execution flow or can be used to leak interesting information from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Obtaining console access'''&lt;br /&gt;
|&lt;br /&gt;
* Serial interfaces (SPI / UART)&lt;br /&gt;
|&lt;br /&gt;
* By connecting to a serial interface, we will obtain full console access to a device&lt;br /&gt;
* Usually security measures include custom bootloaders that prevent the attacker from entering single user mode, but that can also be bypassed.&lt;br /&gt;
|-&lt;br /&gt;
| '''Insecure 3rd party components'''&lt;br /&gt;
|&lt;br /&gt;
* Software&lt;br /&gt;
|&lt;br /&gt;
* Out of date versions of busybox, openssl, ssh, web servers, etc.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Medical Devices =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Medical Device Testing ==&lt;br /&gt;
&lt;br /&gt;
The Medical Device Testing project is intended to provide some basic attack surface considerations that should be evaluated before shipping Medical Device equipment.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''HL7'''&lt;br /&gt;
|&lt;br /&gt;
* XML Parsing&lt;br /&gt;
** XSS&lt;br /&gt;
* Information Disclosure&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure:&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Data Flow'''&lt;br /&gt;
|&lt;br /&gt;
* What data is being captured?&lt;br /&gt;
* How does it move within the ecosystem?&lt;br /&gt;
* How is it protected in transit?&lt;br /&gt;
* How is it protected at rest?&lt;br /&gt;
* Who is that data shared with?&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
* Failure state analysis&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Medical Attack Surfaces project? ==&lt;br /&gt;
&lt;br /&gt;
The Medical Attack Surfaces project provides:&lt;br /&gt;
&lt;br /&gt;
* A simple way for testers, manufacturers, developers, and users to get an understanding of the complexity of a modern medical environment&lt;br /&gt;
* Allows people to visualize the numerous attack surfaces that need to be defended within medical equipment ecosystems&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Daniel Miessler presented on using Adaptive Testing Methodologies to evaluate the security of medical devices at RSA 2017.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilities&lt;br /&gt;
|&lt;br /&gt;
* Out-of-date core components&lt;br /&gt;
* Unsupported core components&lt;br /&gt;
* Expired and/or self-signed certificates&lt;br /&gt;
* Same certificate used on multiple devices&lt;br /&gt;
* Admin web interface concerns&lt;br /&gt;
* Hardcoded or easy to guess credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption key exposure&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Manufacturer Recommendations&lt;br /&gt;
|&lt;br /&gt;
* Ensure that supported and up-to-date software is used by developers&lt;br /&gt;
* Ensure that robust update mechanisms are in place for devices&lt;br /&gt;
* Ensure that certificates are not duplicated across devices and product lines.&lt;br /&gt;
* Ensure supported and up-to-date software is used by developers&lt;br /&gt;
* Develop a mechanism to ensure a new certificate is installed when old ones expire&lt;br /&gt;
* Disable deprecated SSL versions&lt;br /&gt;
* Ensure developers do not code in easy to guess or common admin passwords&lt;br /&gt;
* Ensure services such as SSH have a secure password created&lt;br /&gt;
* Develop a mechanism that requires the user to create a secure admin password during initial device setup&lt;br /&gt;
* Ensure developers do not hard code passwords or hashes&lt;br /&gt;
* Have source code reviewed by a third party before releasing device to production&lt;br /&gt;
* Ensure industry standard encryption or strong hashing is used&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Event Logging Project=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:                   OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Logging Events==&lt;br /&gt;
&lt;br /&gt;
This is a working draft of the recommended minimum IoT Device logging events. This includes many   different types of devices, including consumer IoT, enterprise IoT, and ICS/SCADA type devices.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Event Category&lt;br /&gt;
! Events&lt;br /&gt;
|-&lt;br /&gt;
| '''Request Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
* Unexpected Quantity of Characters in Parameter&lt;br /&gt;
* Unexpected Type of Characters in Parameter&lt;br /&gt;
|-&lt;br /&gt;
| '''Authentication Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Multiple Failed Passwords&lt;br /&gt;
* High Rate of Login Attempts&lt;br /&gt;
* Additional POST Variable&lt;br /&gt;
* Deviation from Normal GEO Location&lt;br /&gt;
|-&lt;br /&gt;
| '''Session Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying the Existing Cookie&lt;br /&gt;
* Substituting Another User's Valid SessionID or Cookie&lt;br /&gt;
* Source Location Changes During Session&lt;br /&gt;
|-&lt;br /&gt;
| '''Access Control Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
* Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
* Forced Browsing Attempt&lt;br /&gt;
|-&lt;br /&gt;
| '''Ecosystem Membership Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Traffic Seen from Disenrolled System&lt;br /&gt;
* Traffic Seen from Unenrolled System&lt;br /&gt;
* Failed Attempt to Enroll in Ecosystem&lt;br /&gt;
* Multiple Attempts to Enroll in Ecosystem&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Access Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Case Tampering Detected&lt;br /&gt;
* Device Logic Board Tampering Detected&lt;br /&gt;
|-&lt;br /&gt;
| '''Administrative Mode Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Entered Administrative Mode&lt;br /&gt;
* Device Accessed Using Default Administrative Credentials&lt;br /&gt;
|-&lt;br /&gt;
| '''Input Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Double Encoded Character&lt;br /&gt;
* Unexpected Encoding Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Command Injection Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
* Abnormal Quantity of Returned Records&lt;br /&gt;
|-&lt;br /&gt;
| '''Honey Trap Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Honey Trap Resource Requested&lt;br /&gt;
* Honey Trap Data Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Reputation Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Suspicious or Disallowed User Source Location&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:  25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Logging Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Secure Logging Project provides a list of core events that should be logged in any IoT-related system. The project exists because IoT systems in general are not logging nearly enough events to constitute input for a solid detection and response program around IoT devices, and for companies that want to do this there are not many good resources for what should be logged.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSensor_Project The OWASP AppSensor Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Security Policy Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Policy Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Policies Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/iot-this-week/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=232470</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=232470"/>
				<updated>2017-08-19T22:06:40Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: Added a preso on IoT.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Attack_Surface_Areas IoT Attack Surface Areas]&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
Hint: If you're new to Slack, [https://lists.owasp.org/pipermail/owasp-community/2015-July/000703.html join OWASP's slack channel first], then join #iot-security within OWASP's channel.&lt;br /&gt;
&amp;lt;!-- Hey Guys - Andy Lewis here.  I'm not great w/slack but when I browse to https://owasp-iot-security.slack.com/signup&lt;br /&gt;
I'm getting &amp;quot;This team's administrator has not enabled email signups.&amp;quot; and &amp;quot;Ask your administrator to send you an invitation.&amp;quot;&lt;br /&gt;
I'm adding this comment in hopes of being able to get in contact w/someone from the project after Blackhat/Defcon.&lt;br /&gt;
If you're reading this, could you please reach out to me &lt;br /&gt;
alewis@owasp.org&lt;br /&gt;
or open up the slack channel to auto-OK @owasp.org addresses?&lt;br /&gt;
Thanks&lt;br /&gt;
Andy&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/7/7b/IoT_Preso_v1.pptx Quick discussion on IoT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added a [https://owasp-iot-security.slack.com/ Slack channel]&lt;br /&gt;
* Added a sub-project; [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Security_Policy_Project IoT Security Policy Project]&lt;br /&gt;
* Daniel Miessler gave his [https://www.youtube.com/watch?v=RhxHHD790nw IoT talk at DEFCON 23]&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
** UART (Serial)&lt;br /&gt;
** JTAG / SWD&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure ([[Top 10 2013-A6-Sensitive Data Exposure|See OWASP Top 10 - A6 Sensitive data exposure]]):&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
** Verify for old sw versions and possible attacks (Heartbleed, Shellshock, old PHP versions etc)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade possibility&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Firmware loaded over insecure channel (no TLS)&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Check for insecure direct object references&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damage (Physicall)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
* Usage of pre-programmed default passwords&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping or tampering  by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware and storage extraction'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://www.flashrom.org/Flashrom In-Situ dumping]&lt;br /&gt;
* Intercepting a OTA update&lt;br /&gt;
* Downloading from the manufacturers web page&lt;br /&gt;
* [https://www.exploitee.rs/index.php/Exploitee.rs_Low_Voltage_e-MMC_Adapter eMMC tapping]&lt;br /&gt;
* Unsoldering the SPI Flash / eMMC chip and reading it in a adapter&lt;br /&gt;
|&lt;br /&gt;
* Firmware contains a lot of useful information, like source code and binaries of running services, pre-set passwords, ssh keys etc.  &lt;br /&gt;
|-&lt;br /&gt;
| '''Manipulating the code execution flow of the device'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://wiki.newae.com/Main_Page Side channel attacks like glitching]&lt;br /&gt;
|&lt;br /&gt;
* With the help of a JTAG adapter and gdb we can modify the execution of firmware in the device and bypass almost all software based security controls.&lt;br /&gt;
* Side channel attacks can also modify the execution flow or can be used to leak interesting information from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Obtaining console access'''&lt;br /&gt;
|&lt;br /&gt;
* Serial interfaces (SPI / UART)&lt;br /&gt;
|&lt;br /&gt;
* By connecting to a serial interface, we will obtain full console access to a device&lt;br /&gt;
* Usually security measures include custom bootloaders that prevent the attacker from entering single user mode, but that can also be bypassed.&lt;br /&gt;
|-&lt;br /&gt;
| '''Insecure 3rd party components'''&lt;br /&gt;
|&lt;br /&gt;
* Software&lt;br /&gt;
|&lt;br /&gt;
* Out of date versions of busybox, openssl, ssh, web servers, etc.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Medical Devices =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Medical Device Testing ==&lt;br /&gt;
&lt;br /&gt;
The Medical Device Testing project is intended to provide some basic attack surface considerations that should be evaluated before shipping Medical Device equipment.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''HL7'''&lt;br /&gt;
|&lt;br /&gt;
* XML Parsing&lt;br /&gt;
** XSS&lt;br /&gt;
* Information Disclosure&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure:&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Data Flow'''&lt;br /&gt;
|&lt;br /&gt;
* What data is being captured?&lt;br /&gt;
* How does it move within the ecosystem?&lt;br /&gt;
* How is it protected in transit?&lt;br /&gt;
* How is it protected at rest?&lt;br /&gt;
* Who is that data shared with?&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
* Failure state analysis&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Medical Attack Surfaces project? ==&lt;br /&gt;
&lt;br /&gt;
The Medical Attack Surfaces project provides:&lt;br /&gt;
&lt;br /&gt;
* A simple way for testers, manufacturers, developers, and users to get an understanding of the complexity of a modern medical environment&lt;br /&gt;
* Allows people to visualize the numerous attack surfaces that need to be defended within medical equipment ecosystems&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Daniel Miessler presented on using Adaptive Testing Methodologies to evaluate the security of medical devices at RSA 2017.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilities&lt;br /&gt;
|&lt;br /&gt;
* Out-of-date core components&lt;br /&gt;
* Unsupported core components&lt;br /&gt;
* Expired and/or self-signed certificates&lt;br /&gt;
* Same certificate used on multiple devices&lt;br /&gt;
* Admin web interface concerns&lt;br /&gt;
* Hardcoded or easy to guess credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption key exposure&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Manufacturer Recommendations&lt;br /&gt;
|&lt;br /&gt;
* Ensure that supported and up-to-date software is used by developers&lt;br /&gt;
* Ensure that robust update mechanisms are in place for devices&lt;br /&gt;
* Ensure that certificates are not duplicated across devices and product lines.&lt;br /&gt;
* Ensure supported and up-to-date software is used by developers&lt;br /&gt;
* Develop a mechanism to ensure a new certificate is installed when old ones expire&lt;br /&gt;
* Disable deprecated SSL versions&lt;br /&gt;
* Ensure developers do not code in easy to guess or common admin passwords&lt;br /&gt;
* Ensure services such as SSH have a secure password created&lt;br /&gt;
* Develop a mechanism that requires the user to create a secure admin password during initial device setup&lt;br /&gt;
* Ensure developers do not hard code passwords or hashes&lt;br /&gt;
* Have source code reviewed by a third party before releasing device to production&lt;br /&gt;
* Ensure industry standard encryption or strong hashing is used&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Event Logging Project=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:                   OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Logging Events==&lt;br /&gt;
&lt;br /&gt;
This is a working draft of the recommended minimum IoT Device logging events. This includes many   different types of devices, including consumer IoT, enterprise IoT, and ICS/SCADA type devices.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Event Category&lt;br /&gt;
! Events&lt;br /&gt;
|-&lt;br /&gt;
| '''Request Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
* Unexpected Quantity of Characters in Parameter&lt;br /&gt;
* Unexpected Type of Characters in Parameter&lt;br /&gt;
|-&lt;br /&gt;
| '''Authentication Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Multiple Failed Passwords&lt;br /&gt;
* High Rate of Login Attempts&lt;br /&gt;
* Additional POST Variable&lt;br /&gt;
* Deviation from Normal GEO Location&lt;br /&gt;
|-&lt;br /&gt;
| '''Session Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying the Existing Cookie&lt;br /&gt;
* Substituting Another User's Valid SessionID or Cookie&lt;br /&gt;
* Source Location Changes During Session&lt;br /&gt;
|-&lt;br /&gt;
| '''Access Control Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
* Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
* Forced Browsing Attempt&lt;br /&gt;
|-&lt;br /&gt;
| '''Ecosystem Membership Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Traffic Seen from Disenrolled System&lt;br /&gt;
* Traffic Seen from Unenrolled System&lt;br /&gt;
* Failed Attempt to Enroll in Ecosystem&lt;br /&gt;
* Multiple Attempts to Enroll in Ecosystem&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Access Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Case Tampering Detected&lt;br /&gt;
* Device Logic Board Tampering Detected&lt;br /&gt;
|-&lt;br /&gt;
| '''Administrative Mode Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Entered Administrative Mode&lt;br /&gt;
* Device Accessed Using Default Administrative Credentials&lt;br /&gt;
|-&lt;br /&gt;
| '''Input Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Double Encoded Character&lt;br /&gt;
* Unexpected Encoding Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Command Injection Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
* Abnormal Quantity of Returned Records&lt;br /&gt;
|-&lt;br /&gt;
| '''Honey Trap Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Honey Trap Resource Requested&lt;br /&gt;
* Honey Trap Data Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Reputation Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Suspicious or Disallowed User Source Location&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:  25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Logging Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Secure Logging Project provides a list of core events that should be logged in any IoT-related system. The project exists because IoT systems in general are not logging nearly enough events to constitute input for a solid detection and response program around IoT devices, and for companies that want to do this there are not many good resources for what should be logged.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSensor_Project The OWASP AppSensor Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Security Policy Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Policy Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Policies Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/iot-this-week/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:IoT_Preso_v1.pptx&amp;diff=232469</id>
		<title>File:IoT Preso v1.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:IoT_Preso_v1.pptx&amp;diff=232469"/>
				<updated>2017-08-19T22:03:16Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: Short discussion about IoT.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Short discussion about IoT.&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=230445</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=230445"/>
				<updated>2017-06-06T20:56:57Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Attack_Surface_Areas IoT Attack Surface Areas]&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added a [https://owasp-iot-security.slack.com/ Slack channel]&lt;br /&gt;
* Added a sub-project; [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Security_Policy_Project IoT Security Policy Project]&lt;br /&gt;
* Daniel Miessler gave his [https://www.youtube.com/watch?v=RhxHHD790nw IoT talk at DEFCON 23]&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
** UART (Serial)&lt;br /&gt;
** JTAG / SWD&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure ([[Top 10 2013-A6-Sensitive Data Exposure|See OWASP Top 10 - A6 Sensitive data exposure]]):&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
** Verify for old sw versions and possible attacks (Heartbleed, Shellshock, old PHP versions etc)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade possibility&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Firmware loaded over insecure channel (no TLS)&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Check for insecure direct object references&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damage (Physicall)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
* Usage of pre-programmed default passwords&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping or tampering  by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware and storage extraction'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://www.flashrom.org/Flashrom In-Situ dumping]&lt;br /&gt;
* Intercepting a OTA update&lt;br /&gt;
* Downloading from the manufacturers web page&lt;br /&gt;
* [https://www.exploitee.rs/index.php/Exploitee.rs_Low_Voltage_e-MMC_Adapter eMMC tapping]&lt;br /&gt;
* Unsoldering the SPI Flash / eMMC chip and reading it in a adapter&lt;br /&gt;
|&lt;br /&gt;
* Firmware contains a lot of useful information, like source code and binaries of running services, pre-set passwords, ssh keys etc.  &lt;br /&gt;
|-&lt;br /&gt;
| '''Manipulating the code execution flow of the device'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://wiki.newae.com/Main_Page Side channel attacks like glitching]&lt;br /&gt;
|&lt;br /&gt;
* With the help of a JTAG adapter and gdb we can modify the execution of firmware in the device and bypass almost all software based security controls.&lt;br /&gt;
* Side channel attacks can also modify the execution flow or can be used to leak interesting information from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Obtaining console access'''&lt;br /&gt;
|&lt;br /&gt;
* Serial interfaces (SPI / UART)&lt;br /&gt;
|&lt;br /&gt;
* By connecting to a serial interface, we will obtain full console access to a device&lt;br /&gt;
* Usually security measures include custom bootloaders that prevent the attacker from entering single user mode, but that can also be bypassed.&lt;br /&gt;
|-&lt;br /&gt;
| '''Insecure 3rd party components'''&lt;br /&gt;
|&lt;br /&gt;
* Software&lt;br /&gt;
|&lt;br /&gt;
* Out of date versions of busybox, openssl, ssh, web servers, etc.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Medical Devices =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Medical Device Testing ==&lt;br /&gt;
&lt;br /&gt;
The Medical Device Testing project is intended to provide some basic attack surface considerations that should be evaluated before shipping Medical Device equipment.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''HL7'''&lt;br /&gt;
|&lt;br /&gt;
* XML Parsing&lt;br /&gt;
** XSS&lt;br /&gt;
* Information Disclosure&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure:&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Data Flow'''&lt;br /&gt;
|&lt;br /&gt;
* What data is being captured?&lt;br /&gt;
* How does it move within the ecosystem?&lt;br /&gt;
* How is it protected in transit?&lt;br /&gt;
* How is it protected at rest?&lt;br /&gt;
* Who is that data shared with?&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
* Failure state analysis&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Medical Attack Surfaces project? ==&lt;br /&gt;
&lt;br /&gt;
The Medical Attack Surfaces project provides:&lt;br /&gt;
&lt;br /&gt;
* A simple way for testers, manufacturers, developers, and users to get an understanding of the complexity of a modern medical environment&lt;br /&gt;
* Allows people to visualize the numerous attack surfaces that need to be defended within medical equipment ecosystems&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Daniel Miessler presented on using Adaptive Testing Methodologies to evaluate the security of medical devices at RSA 2017.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Out-of-date core components&lt;br /&gt;
* Unsupported core components&lt;br /&gt;
* Expired and/or self-signed certificates&lt;br /&gt;
* Same certificate used on multiple devices&lt;br /&gt;
* Admin web interface concerns&lt;br /&gt;
* Hardcoded or easy to guess credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption key exposure&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Manufacturer Recommendations&lt;br /&gt;
|&lt;br /&gt;
* Ensure that supported and up-to-date software is used by developers&lt;br /&gt;
* Ensure that robust update mechanisms are in place for devices&lt;br /&gt;
* Ensure that certificates are not duplicated across devices and product lines.&lt;br /&gt;
* Ensure supported and up-to-date software is used by developers&lt;br /&gt;
* Develop a mechanism to ensure a new certificate is installed when old ones expire&lt;br /&gt;
* Disable deprecated SSL versions&lt;br /&gt;
* Ensure developers do not code in easy to guess or common admin passwords&lt;br /&gt;
* Ensure services such as SSH have a secure password created&lt;br /&gt;
* Develop a mechanism that requires the user to create a secure admin password during initial device setup&lt;br /&gt;
* Ensure developers do not hard code passwords or hashes&lt;br /&gt;
* Have source code reviewed by a third party before releasing device to production&lt;br /&gt;
* Ensure industry standard encryption or strong hashing is used&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Event Logging Project=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:                   OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Logging Events==&lt;br /&gt;
&lt;br /&gt;
This is a working draft of the recommended minimum IoT Device logging events. This includes many   different types of devices, including consumer IoT, enterprise IoT, and ICS/SCADA type devices.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Event Category&lt;br /&gt;
! Events&lt;br /&gt;
|-&lt;br /&gt;
| '''Request Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
* Unexpected Quantity of Characters in Parameter&lt;br /&gt;
* Unexpected Type of Characters in Parameter&lt;br /&gt;
|-&lt;br /&gt;
| '''Authentication Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Multiple Failed Passwords&lt;br /&gt;
* High Rate of Login Attempts&lt;br /&gt;
* Additional POST Variable&lt;br /&gt;
* Deviation from Normal GEO Location&lt;br /&gt;
|-&lt;br /&gt;
| '''Session Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying the Existing Cookie&lt;br /&gt;
* Substituting Another User's Valid SessionID or Cookie&lt;br /&gt;
* Source Location Changes During Session&lt;br /&gt;
|-&lt;br /&gt;
| '''Access Control Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
* Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
* Forced Browsing Attempt&lt;br /&gt;
|-&lt;br /&gt;
| '''Ecosystem Membership Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Traffic Seen from Disenrolled System&lt;br /&gt;
* Traffic Seen from Unenrolled System&lt;br /&gt;
* Failed Attempt to Enroll in Ecosystem&lt;br /&gt;
* Multiple Attempts to Enroll in Ecosystem&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Access Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Case Tampering Detected&lt;br /&gt;
* Device Logic Board Tampering Detected&lt;br /&gt;
|-&lt;br /&gt;
| '''Administrative Mode Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Entered Administrative Mode&lt;br /&gt;
* Device Accessed Using Default Administrative Credentials&lt;br /&gt;
|-&lt;br /&gt;
| '''Input Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Double Encoded Character&lt;br /&gt;
* Unexpected Encoding Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Command Injection Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
* Abnormal Quantity of Returned Records&lt;br /&gt;
|-&lt;br /&gt;
| '''Honey Trap Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Honey Trap Resource Requested&lt;br /&gt;
* Honey Trap Data Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Reputation Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Suspicious or Disallowed User Source Location&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:  25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Logging Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Secure Logging Project provides a list of core events that should be logged in any IoT-related system. The project exists because IoT systems in general are not logging nearly enough events to constitute input for a solid detection and response program around IoT devices, and for companies that want to do this there are not many good resources for what should be logged.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSensor_Project The OWASP AppSensor Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Security Policy Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Policy Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Policies Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/iot-this-week/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=229827</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=229827"/>
				<updated>2017-05-20T20:31:45Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Attack_Surface_Areas IoT Attack Surface Areas]&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added a [https://owasp-iot-security.slack.com/ Slack channel]&lt;br /&gt;
* Added a sub-project; [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Security_Policy_Project IoT Security Policy Project]&lt;br /&gt;
* Daniel Miessler gave his [https://www.youtube.com/watch?v=RhxHHD790nw IoT talk at DEFCON 23]&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
** UART (Serial)&lt;br /&gt;
** JTAG / SWD&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure ([[Top 10 2013-A6-Sensitive Data Exposure|See OWASP Top 10 - A6 Sensitive data exposure]]):&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
** Verify for old sw versions and possible attacks (Heartbleed, Shellshock, old PHP versions etc)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade possibility&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Firmware loaded over insecure channel (no TLS)&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Check for insecure direct object references&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damage (Physicall)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
* Usage of pre-programmed default passwords&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping or tampering  by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware and storage extraction'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://www.flashrom.org/Flashrom In-Situ dumping]&lt;br /&gt;
* Intercepting a OTA update&lt;br /&gt;
* Downloading from the manufacturers web page&lt;br /&gt;
* [https://www.exploitee.rs/index.php/Exploitee.rs_Low_Voltage_e-MMC_Adapter eMMC tapping]&lt;br /&gt;
* Unsoldering the SPI Flash / eMMC chip and reading it in a adapter&lt;br /&gt;
|&lt;br /&gt;
* Firmware contains a lot of useful information, like source code and binaries of running services, pre-set passwords, ssh keys etc.  &lt;br /&gt;
|-&lt;br /&gt;
| '''Manipulating the code execution flow of the device'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://wiki.newae.com/Main_Page Side channel attacks like glitching]&lt;br /&gt;
|&lt;br /&gt;
* With the help of a JTAG adapter and gdb we can modify the execution of firmware in the device and bypass almost all software based security controls.&lt;br /&gt;
* Side channel attacks can also modify the execution flow or can be used to leak interesting information from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Obtaining console access'''&lt;br /&gt;
|&lt;br /&gt;
* Serial interfaces (SPI / UART)&lt;br /&gt;
|&lt;br /&gt;
* By connecting to a serial interface, we will obtain full console access to a device&lt;br /&gt;
* Usually security measures include custom bootloaders that prevent the attacker from entering single user mode, but that can also be bypassed.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Medical Devices =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Medical Device Testing ==&lt;br /&gt;
&lt;br /&gt;
The Medical Device Testing project is intended to provide some basic attack surface considerations that should be evaluated before shipping Medical Device equipment.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''HL7'''&lt;br /&gt;
|&lt;br /&gt;
* XML Parsing&lt;br /&gt;
** XSS&lt;br /&gt;
* Information Disclosure&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure:&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Data Flow'''&lt;br /&gt;
|&lt;br /&gt;
* What data is being captured?&lt;br /&gt;
* How does it move within the ecosystem?&lt;br /&gt;
* How is it protected in transit?&lt;br /&gt;
* How is it protected at rest?&lt;br /&gt;
* Who is that data shared with?&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
* Failure state analysis&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Medical Attack Surfaces project? ==&lt;br /&gt;
&lt;br /&gt;
The Medical Attack Surfaces project provides:&lt;br /&gt;
&lt;br /&gt;
* A simple way for testers, manufacturers, developers, and users to get an understanding of the complexity of a modern medical environment&lt;br /&gt;
* Allows people to visualize the numerous attack surfaces that need to be defended within medical equipment ecosystems&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Daniel Miessler presented on using Adaptive Testing Methodologies to evaluate the security of medical devices at RSA 2017.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Out-of-date core components&lt;br /&gt;
* Unsupported core components&lt;br /&gt;
* Expired and/or self-signed certificates&lt;br /&gt;
* Same certificate used on multiple devices&lt;br /&gt;
* Admin web interface concerns&lt;br /&gt;
* Hardcoded or easy to guess credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption key exposure&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Manufacturer Recommendations&lt;br /&gt;
|&lt;br /&gt;
* Ensure that supported and up-to-date software is used by developers&lt;br /&gt;
* Ensure that robust update mechanisms are in place for devices&lt;br /&gt;
* Ensure that certificates are not duplicated across devices and product lines.&lt;br /&gt;
* Ensure supported and up-to-date software is used by developers&lt;br /&gt;
* Develop a mechanism to ensure a new certificate is installed when old ones expire&lt;br /&gt;
* Disable deprecated SSL versions&lt;br /&gt;
* Ensure developers do not code in easy to guess or common admin passwords&lt;br /&gt;
* Ensure services such as SSH have a secure password created&lt;br /&gt;
* Develop a mechanism that requires the user to create a secure admin password during initial device setup&lt;br /&gt;
* Ensure developers do not hard code passwords or hashes&lt;br /&gt;
* Have source code reviewed by a third party before releasing device to production&lt;br /&gt;
* Ensure industry standard encryption or strong hashing is used&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Event Logging Project=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:                   OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Logging Events==&lt;br /&gt;
&lt;br /&gt;
This is a working draft of the recommended minimum IoT Device logging events. This includes many   different types of devices, including consumer IoT, enterprise IoT, and ICS/SCADA type devices.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Event Category&lt;br /&gt;
! Events&lt;br /&gt;
|-&lt;br /&gt;
| '''Request Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
* Unexpected Quantity of Characters in Parameter&lt;br /&gt;
* Unexpected Type of Characters in Parameter&lt;br /&gt;
|-&lt;br /&gt;
| '''Authentication Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Multiple Failed Passwords&lt;br /&gt;
* High Rate of Login Attempts&lt;br /&gt;
* Additional POST Variable&lt;br /&gt;
* Deviation from Normal GEO Location&lt;br /&gt;
|-&lt;br /&gt;
| '''Session Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying the Existing Cookie&lt;br /&gt;
* Substituting Another User's Valid SessionID or Cookie&lt;br /&gt;
* Source Location Changes During Session&lt;br /&gt;
|-&lt;br /&gt;
| '''Access Control Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
* Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
* Forced Browsing Attempt&lt;br /&gt;
|-&lt;br /&gt;
| '''Ecosystem Membership Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Traffic Seen from Disenrolled System&lt;br /&gt;
* Traffic Seen from Unenrolled System&lt;br /&gt;
* Failed Attempt to Enroll in Ecosystem&lt;br /&gt;
* Multiple Attempts to Enroll in Ecosystem&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Access Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Case Tampering Detected&lt;br /&gt;
* Device Logic Board Tampering Detected&lt;br /&gt;
|-&lt;br /&gt;
| '''Administrative Mode Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Entered Administrative Mode&lt;br /&gt;
* Device Accessed Using Default Administrative Credentials&lt;br /&gt;
|-&lt;br /&gt;
| '''Input Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Double Encoded Character&lt;br /&gt;
* Unexpected Encoding Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Command Injection Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
* Abnormal Quantity of Returned Records&lt;br /&gt;
|-&lt;br /&gt;
| '''Honey Trap Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Honey Trap Resource Requested&lt;br /&gt;
* Honey Trap Data Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Reputation Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Suspicious or Disallowed User Source Location&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:  25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Logging Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Secure Logging Project provides a list of core events that should be logged in any IoT-related system. The project exists because IoT systems in general are not logging nearly enough events to constitute input for a solid detection and response program around IoT devices, and for companies that want to do this there are not many good resources for what should be logged.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSensor_Project The OWASP AppSensor Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Security Policy Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Policy Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Policies Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/iot-this-week/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=229826</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=229826"/>
				<updated>2017-05-20T20:30:57Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Attack_Surface_Areas IoT Attack Surface Areas]&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added a [https://owasp-iot-security.slack.com/ Slack channel]&lt;br /&gt;
* Added a sub-project; [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Security_Policy_Project IoT Security Policy Project]&lt;br /&gt;
* Daniel Miessler gave his [https://www.youtube.com/watch?v=RhxHHD790nw IoT talk at DEFCON 23]&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
** UART (Serial)&lt;br /&gt;
** JTAG / SWD&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure ([[Top 10 2013-A6-Sensitive Data Exposure|See OWASP Top 10 - A6 Sensitive data exposure]]):&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
** Verify for old sw versions and possible attacks (Heartbleed, Shellshock, old PHP versions etc)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade possibility&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Firmware loaded over insecure channel (no TLS)&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Check for insecure direct object references&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damage (Physicall)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
* Usage of pre-programmed default passwords&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping or tampering  by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware and storage extraction'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://www.flashrom.org/Flashrom In-Situ dumping]&lt;br /&gt;
* Intercepting a OTA update&lt;br /&gt;
* Downloading from the manufacturers web page&lt;br /&gt;
* [https://www.exploitee.rs/index.php/Exploitee.rs_Low_Voltage_e-MMC_Adapter eMMC tapping]&lt;br /&gt;
* Unsoldering the SPI Flash / eMMC chip and reading it in a adapter&lt;br /&gt;
|&lt;br /&gt;
* Firmware contains a lot of useful information, like source code and binaries of running services, pre-set passwords, ssh keys etc.  &lt;br /&gt;
|-&lt;br /&gt;
| '''Manipulating the code execution flow of the device'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://wiki.newae.com/Main_Page Side channel attacks like glitching]&lt;br /&gt;
|&lt;br /&gt;
* With the help of a JTAG adapter and gdb we can modify the execution of firmware in the device and bypass almost all software based security controls.&lt;br /&gt;
* Side channel attacks can also modify the execution flow or can be used to leak interesting information from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Obtaining console access'''&lt;br /&gt;
|&lt;br /&gt;
* Serial interfaces (SPI / UART)&lt;br /&gt;
|&lt;br /&gt;
* By connecting to a serial interface, we will obtain full console access to a device&lt;br /&gt;
* Usually security measures include custom bootloaders that prevent the attacker from entering single user mode, but that can also be bypassed.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Medical Devices =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Medical Device Testing ==&lt;br /&gt;
&lt;br /&gt;
The Medical Device Testing project is intended to provide some basic attack surface considerations that should be evaluated before shipping Medical Device equipment.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''HL7'''&lt;br /&gt;
|&lt;br /&gt;
* XML Parsing&lt;br /&gt;
** XSS&lt;br /&gt;
* Information Disclosure&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure:&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Data Flow'''&lt;br /&gt;
|&lt;br /&gt;
* What data is being captured?&lt;br /&gt;
* How does it move within the ecosystem?&lt;br /&gt;
* How is it protected in transit?&lt;br /&gt;
* How is it protected at rest?&lt;br /&gt;
* Who is that data shared with?&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
* Failure state analysis&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Medical Attack Surfaces project? ==&lt;br /&gt;
&lt;br /&gt;
The Medical Attack Surfaces project provides:&lt;br /&gt;
&lt;br /&gt;
* A simple way for testers, manufacturers, developers, and users to get an understanding of the complexity of a modern medical environment&lt;br /&gt;
* Allows people to visualize the numerous attack surfaces that need to be defended within medical equipment ecosystems&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Daniel Miessler presented on using Adaptive Testing Methodologies to evaluate the security of medical devices at RSA 2017.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Out-of-date core components&lt;br /&gt;
* Unsupported core components&lt;br /&gt;
* Expired and/or self-signed certificates&lt;br /&gt;
* Same certificate used on multiple devices&lt;br /&gt;
* Admin web interface concerns&lt;br /&gt;
* Hardcoded or easy to guess credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption key exposure&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Manufacturer Recommendations&lt;br /&gt;
|&lt;br /&gt;
* Ensure that supported and up-to-date software is used by developers&lt;br /&gt;
* Ensure that robust update mechanisms are in place for devices&lt;br /&gt;
* Ensure that certificates are not duplicated across devices and product lines.&lt;br /&gt;
* Ensure supported and up-to-date software is used by developers&lt;br /&gt;
* Develop a mechanism to ensure a new certificate is installed when old ones expire&lt;br /&gt;
* Disable deprecated SSL versions&lt;br /&gt;
* Ensure developers do not code in easy to guess or common admin passwords&lt;br /&gt;
* Ensure services such as SSH have a secure password created&lt;br /&gt;
* Develop a mechanism that requires the user to create a secure admin password during initial device setup&lt;br /&gt;
* Ensure developers do not hard code passwords or hashes&lt;br /&gt;
* Have source code reviewed by a third party before releasing device to production&lt;br /&gt;
* Ensure industry standard encryption or strong hashing is used&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Event Logging Project=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:                   OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Logging Events==&lt;br /&gt;
&lt;br /&gt;
This is a working draft of the recommended minimum IoT Device logging events. This includes many   different types of devices, including consumer IoT, enterprise IoT, and ICS/SCADA type devices.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Event Category&lt;br /&gt;
! Events&lt;br /&gt;
|-&lt;br /&gt;
| '''Request Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
* Unexpected Quantity of Characters in Parameter&lt;br /&gt;
* Unexpected Type of Characters in Parameter&lt;br /&gt;
|-&lt;br /&gt;
| '''Authentication Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Multiple Failed Passwords&lt;br /&gt;
* High Rate of Login Attempts&lt;br /&gt;
* Additional POST Variable&lt;br /&gt;
* Deviation from Normal GEO Location&lt;br /&gt;
|-&lt;br /&gt;
| '''Session Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying the Existing Cookie&lt;br /&gt;
* Substituting Another User's Valid SessionID or Cookie&lt;br /&gt;
* Source Location Changes During Session&lt;br /&gt;
|-&lt;br /&gt;
| '''Access Control Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
* Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
* Forced Browsing Attempt&lt;br /&gt;
|-&lt;br /&gt;
| '''Ecosystem Membership Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Traffic Seen from Disenrolled System&lt;br /&gt;
* Traffic Seen from Unenrolled System&lt;br /&gt;
* Failed Attempt to Enroll in Ecosystem&lt;br /&gt;
* Multiple Attempts to Enroll in Ecosystem&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Access Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Case Tampering Detected&lt;br /&gt;
* Device Logic Board Tampering Detected&lt;br /&gt;
|-&lt;br /&gt;
| '''Administrative Mode Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Entered Administrative Mode&lt;br /&gt;
* Device Accessed Using Default Administrative Credentials&lt;br /&gt;
|-&lt;br /&gt;
| '''Input Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Double Encoded Character&lt;br /&gt;
* Unexpected Encoding Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Command Injection Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
* Abnormal Quantity of Returned Records&lt;br /&gt;
|-&lt;br /&gt;
| '''Honey Trap Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Honey Trap Resource Requested&lt;br /&gt;
* Honey Trap Data Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Reputation Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Suspicious or Disallowed User Source Location&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:  25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Logging Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Secure Logging Project provides a list of core events that should be logged in any IoT-related system. The project exists because IoT systems in general are not logging nearly enough events to constitute input for a solid detection and response program around IoT devices, and for companies that want to do this there are not many good resources for what should be logged.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSensor_Project The OWASP AppSensor Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Security Policy Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Policy Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Policies Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/iot-this-week/]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=220311</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=220311"/>
				<updated>2016-08-10T18:31:32Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: /* News and Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* IoT Attack Surface Areas&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added a Slack channel&lt;br /&gt;
* Added a sub-project; IoT Security Policy Project&lt;br /&gt;
* Daniel Miessler gave his IoT talk at DEFCON 23&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Access Control'''&lt;br /&gt;
|&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Cleartext usernames&lt;br /&gt;
* Cleartext passwords&lt;br /&gt;
* Third-party credentials&lt;br /&gt;
* Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Encryption (Symmetric, Asymmetric)&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, Zigbee, Bluetooth)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Out-of-date core components&lt;br /&gt;
* Unsupported core components&lt;br /&gt;
* Expired and/or self-signed certificates&lt;br /&gt;
* Same certificate used on multiple devices&lt;br /&gt;
* Admin web interface concerns&lt;br /&gt;
* Hardcoded or easy to guess credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption key exposure&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Manufacturer Recommendations&lt;br /&gt;
|&lt;br /&gt;
* Ensure that supported and up-to-date software is used by developers&lt;br /&gt;
* Ensure that robust update mechanisms are in place for devices&lt;br /&gt;
* Ensure that certificates are not duplicated across devices and product lines.&lt;br /&gt;
* Ensure supported and up-to-date software is used by developers&lt;br /&gt;
* Develop a mechanism to ensure a new certificate is installed when old ones expire&lt;br /&gt;
* Disable deprecated SSL versions&lt;br /&gt;
* Ensure developers do not code in easy to guess or common admin passwords&lt;br /&gt;
* Ensure services such as SSH have a secure password created&lt;br /&gt;
* Develop a mechanism that requires the user to create a secure admin password during initial device setup&lt;br /&gt;
* Ensure developers do not hard code passwords or hashes&lt;br /&gt;
* Have source code reviewed by a third party before releasing device to production&lt;br /&gt;
* Ensure industry standard encryption or strong hashing is used&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Security Policy Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Policy Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Policies Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=220310</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=220310"/>
				<updated>2016-08-10T18:31:10Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: /* News and Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* IoT Attack Surface Areas&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added a sub-project; IoT Security Policy Project&lt;br /&gt;
* Daniel Miessler gave his IoT talk at DEFCON 23&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Access Control'''&lt;br /&gt;
|&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Cleartext usernames&lt;br /&gt;
* Cleartext passwords&lt;br /&gt;
* Third-party credentials&lt;br /&gt;
* Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Encryption (Symmetric, Asymmetric)&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, Zigbee, Bluetooth)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Out-of-date core components&lt;br /&gt;
* Unsupported core components&lt;br /&gt;
* Expired and/or self-signed certificates&lt;br /&gt;
* Same certificate used on multiple devices&lt;br /&gt;
* Admin web interface concerns&lt;br /&gt;
* Hardcoded or easy to guess credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption key exposure&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Manufacturer Recommendations&lt;br /&gt;
|&lt;br /&gt;
* Ensure that supported and up-to-date software is used by developers&lt;br /&gt;
* Ensure that robust update mechanisms are in place for devices&lt;br /&gt;
* Ensure that certificates are not duplicated across devices and product lines.&lt;br /&gt;
* Ensure supported and up-to-date software is used by developers&lt;br /&gt;
* Develop a mechanism to ensure a new certificate is installed when old ones expire&lt;br /&gt;
* Disable deprecated SSL versions&lt;br /&gt;
* Ensure developers do not code in easy to guess or common admin passwords&lt;br /&gt;
* Ensure services such as SSH have a secure password created&lt;br /&gt;
* Develop a mechanism that requires the user to create a secure admin password during initial device setup&lt;br /&gt;
* Ensure developers do not hard code passwords or hashes&lt;br /&gt;
* Have source code reviewed by a third party before releasing device to production&lt;br /&gt;
* Ensure industry standard encryption or strong hashing is used&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Security Policy Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Policy Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Policies Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=217947</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=217947"/>
				<updated>2016-06-14T22:25:53Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* IoT Attack Surface Areas&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added two sub-projects; ICS/SCADA and Firmware Analysis&lt;br /&gt;
* Daniel Miessler gave his IoT talk at DEFCON 23&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Access Control'''&lt;br /&gt;
|&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Cleartext usernames&lt;br /&gt;
* Cleartext passwords&lt;br /&gt;
* Third-party credentials&lt;br /&gt;
* Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Encryption (Symmetric, Asymmetric)&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, Zigbee, Bluetooth)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Out-of-date core components&lt;br /&gt;
* Unsupported core components&lt;br /&gt;
* Expired and/or self-signed certificates&lt;br /&gt;
* Same certificate used on multiple devices&lt;br /&gt;
* Admin web interface concerns&lt;br /&gt;
* Hardcoded or easy to guess credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption key exposure&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Manufacturer Recommendations&lt;br /&gt;
|&lt;br /&gt;
* Ensure that supported and up-to-date software is used by developers&lt;br /&gt;
* Ensure that robust update mechanisms are in place for devices&lt;br /&gt;
* Ensure that certificates are not duplicated across devices and product lines.&lt;br /&gt;
* Ensure supported and up-to-date software is used by developers&lt;br /&gt;
* Develop a mechanism to ensure a new certificate is installed when old ones expire&lt;br /&gt;
* Disable deprecated SSL versions&lt;br /&gt;
* Ensure developers do not code in easy to guess or common admin passwords&lt;br /&gt;
* Ensure services such as SSH have a secure password created&lt;br /&gt;
* Develop a mechanism that requires the user to create a secure admin password during initial device setup&lt;br /&gt;
* Ensure developers do not hard code passwords or hashes&lt;br /&gt;
* Have source code reviewed by a third party before releasing device to production&lt;br /&gt;
* Ensure industry standard encryption or strong hashing is used&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Security Policy Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Policy Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Policies Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=217946</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=217946"/>
				<updated>2016-06-14T22:24:00Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* IoT Attack Surface Areas&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added two sub-projects; ICS/SCADA and Firmware Analysis&lt;br /&gt;
* Daniel Miessler gave his IoT talk at DEFCON 23&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Access Control'''&lt;br /&gt;
|&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Cleartext usernames&lt;br /&gt;
* Cleartext passwords&lt;br /&gt;
* Third-party credentials&lt;br /&gt;
* Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Encryption (Symmetric, Asymmetric)&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, Zigbee, Bluetooth)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Out-of-date core components&lt;br /&gt;
* Unsupported core components&lt;br /&gt;
* Expired and/or self-signed certificates&lt;br /&gt;
* Same certificate used on multiple devices&lt;br /&gt;
* Admin web interface concerns&lt;br /&gt;
* Hardcoded or easy to guess credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption key exposure&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Manufacturer Recommendations&lt;br /&gt;
|&lt;br /&gt;
* Ensure that supported and up-to-date software is used by developers&lt;br /&gt;
* Ensure that robust update mechanisms are in place for devices&lt;br /&gt;
* Ensure that certificates are not duplicated across devices and product lines.&lt;br /&gt;
* Ensure supported and up-to-date software is used by developers&lt;br /&gt;
* Develop a mechanism to ensure a new certificate is installed when old ones expire&lt;br /&gt;
* Disable deprecated SSL versions&lt;br /&gt;
* Ensure developers do not code in easy to guess or common admin passwords&lt;br /&gt;
* Ensure services such as SSH have a secure password created&lt;br /&gt;
* Develop a mechanism that requires the user to create a secure admin password during initial device setup&lt;br /&gt;
* Ensure developers do not hard code passwords or hashes&lt;br /&gt;
* Have source code reviewed by a third party before releasing device to production&lt;br /&gt;
* Ensure industry standard encryption or strong hashing is used&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Security Policy Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Policy Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Policies Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Sasa Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=217945</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=217945"/>
				<updated>2016-06-14T22:09:22Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* IoT Attack Surface Areas&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added two sub-projects; ICS/SCADA and Firmware Analysis&lt;br /&gt;
* Daniel Miessler gave his IoT talk at DEFCON 23&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Access Control'''&lt;br /&gt;
|&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Cleartext usernames&lt;br /&gt;
* Cleartext passwords&lt;br /&gt;
* Third-party credentials&lt;br /&gt;
* Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Encryption (Symmetric, Asymmetric)&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, Zigbee, Bluetooth)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Out-of-date core components&lt;br /&gt;
* Unsupported core components&lt;br /&gt;
* Expired and/or self-signed certificates&lt;br /&gt;
* Same certificate used on multiple devices&lt;br /&gt;
* Admin web interface concerns&lt;br /&gt;
* Hardcoded or easy to guess credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption key exposure&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Manufacturer Recommendations&lt;br /&gt;
|&lt;br /&gt;
* Ensure that supported and up-to-date software is used by developers&lt;br /&gt;
* Ensure that robust update mechanisms are in place for devices&lt;br /&gt;
* Ensure that certificates are not duplicated across devices and product lines.&lt;br /&gt;
* Ensure supported and up-to-date software is used by developers&lt;br /&gt;
* Develop a mechanism to ensure a new certificate is installed when old ones expire&lt;br /&gt;
* Disable deprecated SSL versions&lt;br /&gt;
* Ensure developers do not code in easy to guess or common admin passwords&lt;br /&gt;
* Ensure services such as SSH have a secure password created&lt;br /&gt;
* Develop a mechanism that requires the user to create a secure admin password during initial device setup&lt;br /&gt;
* Ensure developers do not hard code passwords or hashes&lt;br /&gt;
* Have source code reviewed by a third party before releasing device to production&lt;br /&gt;
* Ensure industry standard encryption or strong hashing is used&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Security Policy Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Policy Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Policies Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Sasa Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=217731</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=217731"/>
				<updated>2016-06-07T01:27:02Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* IoT Attack Surface Areas&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added two sub-projects; ICS/SCADA and Firmware Analysis&lt;br /&gt;
* Daniel Miessler gave his IoT talk at DEFCON 23&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Access Control'''&lt;br /&gt;
|&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Cleartext usernames&lt;br /&gt;
* Cleartext passwords&lt;br /&gt;
* Third-party credentials&lt;br /&gt;
* Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Encryption (Symmetric, Asymmetric)&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, Zigbee, Bluetooth)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Out-of-date core components&lt;br /&gt;
* Unsupported core components&lt;br /&gt;
* Expired and/or self-signed certificates&lt;br /&gt;
* Same certificate used on multiple devices&lt;br /&gt;
* Admin web interface concerns&lt;br /&gt;
* Hardcoded or easy to guess credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption key exposure&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Manufacturer Recommendations&lt;br /&gt;
|&lt;br /&gt;
* Ensure that supported and up-to-date software is used by developers&lt;br /&gt;
* Ensure that robust update mechanisms are in place for devices&lt;br /&gt;
* Ensure that certificates are not duplicated across devices and product lines.&lt;br /&gt;
* Ensure supported and up-to-date software is used by developers&lt;br /&gt;
* Develop a mechanism to ensure a new certificate is installed when old ones expire&lt;br /&gt;
* Disable deprecated SSL versions&lt;br /&gt;
* Ensure developers do not code in easy to guess or common admin passwords&lt;br /&gt;
* Ensure services such as SSH have a secure password created&lt;br /&gt;
* Develop a mechanism that requires the user to create a secure admin password during initial device setup&lt;br /&gt;
* Ensure developers do not hard code passwords or hashes&lt;br /&gt;
* Have source code reviewed by a third party before releasing device to production&lt;br /&gt;
* Ensure industry standard encryption or strong hashing is used&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Security Policy Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Policy Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Policies Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Sasa Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=217726</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=217726"/>
				<updated>2016-06-07T01:17:32Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* IoT Attack Surface Areas&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added two sub-projects; ICS/SCADA and Firmware Analysis&lt;br /&gt;
* Daniel Miessler gave his IoT talk at DEFCON 23&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Access Control'''&lt;br /&gt;
|&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Cleartext usernames&lt;br /&gt;
* Cleartext passwords&lt;br /&gt;
* Third-party credentials&lt;br /&gt;
* Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Encryption (Symmetric, Asymmetric)&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, Zigbee, Bluetooth)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Out-of-date core components&lt;br /&gt;
* Unsupported core components&lt;br /&gt;
* Expired and/or self-signed certificates&lt;br /&gt;
* Same certificate used on multiple devices&lt;br /&gt;
* Admin web interface concerns&lt;br /&gt;
* Hardcoded or easy to guess credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption key exposure&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-  &lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Security Policy Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Policy Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Policies Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Sasa Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=217322</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=217322"/>
				<updated>2016-05-24T01:47:25Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* IoT Attack Surface Areas&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Major Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added two sub-projects; ICS/SCADA and Firmware Analysis&lt;br /&gt;
* Daniel Miessler gave his IoT talk at DEFCON 23&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Access Control'''&lt;br /&gt;
|&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Cleartext usernames&lt;br /&gt;
* Cleartext passwords&lt;br /&gt;
* Third-party credentials&lt;br /&gt;
* Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Encryption (Symmetric, Asymmetric)&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, Zigbee, Bluetooth)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-  &lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Security Policy Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Policy Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Policies Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Sasa Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Top_IoT_Vulnerabilities&amp;diff=217046</id>
		<title>Top IoT Vulnerabilities</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Top_IoT_Vulnerabilities&amp;diff=217046"/>
				<updated>2016-05-18T15:19:04Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Vulnerabilities Back To IoT Vulnerabilities Project]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 IoT Vulnerabilities from 2014 are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''I1'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I1 Insecure Web Interface | Insecure Web Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I2'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I2 Insufficient Authentication/Authorization | Insufficient Authentication/Authorization]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I3'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I3 Insecure Network Services | Insecure Network Services]]&lt;br /&gt;
|-&lt;br /&gt;
| '''I4'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I4 Lack of Transport Encryption | Lack of Transport Encryption/Integrity Verification]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I5'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I5 Privacy Concerns | Privacy Concerns]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I6'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I6 Insecure Cloud Interface | Insecure Cloud Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I7'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I7 Insecure Mobile Interface | Insecure Mobile Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I8'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I8 Insufficient Security Configurability | Insufficient Security Configurability]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I9'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I9 Insecure Software/Firmware | Insecure Software/Firmware]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I10'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I10 Poor Physical Security | Poor Physical Security]]&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=217045</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=217045"/>
				<updated>2016-05-18T15:15:43Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* IoT Attack Surface Areas&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Major Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added two sub-projects; ICS/SCADA and Firmware Analysis&lt;br /&gt;
* Daniel Miessler gave his IoT talk at DEFCON 23&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Access Control'''&lt;br /&gt;
|&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Cleartext usernames&lt;br /&gt;
* Cleartext passwords&lt;br /&gt;
* Third-party credentials&lt;br /&gt;
* Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Encryption (Symmetric, Asymmetric)&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, Zigbee, Bluetooth)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-  &lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Security Policy Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Policy Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Policies Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Sasa Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=217044</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=217044"/>
				<updated>2016-05-18T15:14:32Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* IoT Attack Surface Areas&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Major Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added two sub-projects; ICS/SCADA and Firmware Analysis&lt;br /&gt;
* Daniel Miessler gave his IoT talk at DEFCON 23&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Access Control'''&lt;br /&gt;
|&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Cleartext usernames&lt;br /&gt;
* Cleartext passwords&lt;br /&gt;
* Third-party credentials&lt;br /&gt;
* Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Encryption (Symmetric, Asymmetric)&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, Zigbee, Bluetooth)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-  &lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Security Policy Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Policy Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Policies Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Sasa Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=217043</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=217043"/>
				<updated>2016-05-18T15:13:55Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* IoT Attack Surface Areas&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Major Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added two sub-projects; ICS/SCADA and Firmware Analysis&lt;br /&gt;
* Daniel Miessler gave his IoT talk at DEFCON 23&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Access Control'''&lt;br /&gt;
|&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Cleartext usernames&lt;br /&gt;
* Cleartext passwords&lt;br /&gt;
* Third-party credentials&lt;br /&gt;
* Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Encryption (Symmetric, Asymmetric)&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, Zigbee, Bluetooth)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-  &lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Security Policy Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Policy Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Policies Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Sasa Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Top_IoT_Vulnerabilities&amp;diff=217042</id>
		<title>Top IoT Vulnerabilities</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Top_IoT_Vulnerabilities&amp;diff=217042"/>
				<updated>2016-05-18T15:12:04Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project Back To Internet of Things Project]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 IoT Vulnerabilities from 2014 are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''I1'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I1 Insecure Web Interface | Insecure Web Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I2'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I2 Insufficient Authentication/Authorization | Insufficient Authentication/Authorization]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I3'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I3 Insecure Network Services | Insecure Network Services]]&lt;br /&gt;
|-&lt;br /&gt;
| '''I4'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I4 Lack of Transport Encryption | Lack of Transport Encryption/Integrity Verification]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I5'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I5 Privacy Concerns | Privacy Concerns]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I6'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I6 Insecure Cloud Interface | Insecure Cloud Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I7'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I7 Insecure Mobile Interface | Insecure Mobile Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I8'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I8 Insufficient Security Configurability | Insufficient Security Configurability]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I9'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I9 Insecure Software/Firmware | Insecure Software/Firmware]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I10'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I10 Poor Physical Security | Poor Physical Security]]&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=217041</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=217041"/>
				<updated>2016-05-18T15:10:50Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* IoT Attack Surface Areas&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top IoT Vulnerabilities]&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Major Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added two sub-projects; ICS/SCADA and Firmware Analysis&lt;br /&gt;
* Daniel Miessler gave his IoT talk at DEFCON 23&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Access Control'''&lt;br /&gt;
|&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Cleartext usernames&lt;br /&gt;
* Cleartext passwords&lt;br /&gt;
* Third-party credentials&lt;br /&gt;
* Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Encryption (Symmetric, Asymmetric)&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, Zigbee, Bluetooth)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-  &lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Security Policy Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Policy Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Policies Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Sasa Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=216885</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=216885"/>
				<updated>2016-05-14T23:51:40Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* IoT Attack Surface Areas&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top IoT Vulnerabilities]&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Major Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added two sub-projects; ICS/SCADA and Firmware Analysis&lt;br /&gt;
* Daniel Miessler gave his IoT talk at DEFCON 23&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Access Control'''&lt;br /&gt;
|&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Cleartext usernames&lt;br /&gt;
* Cleartext passwords&lt;br /&gt;
* Third-party credentials&lt;br /&gt;
* Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Encryption (Symmetric, Asymmetric)&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, Zigbee, Bluetooth)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-  &lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Security Policy Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Policy Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Policies Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Sasa Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=216884</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=216884"/>
				<updated>2016-05-14T19:49:35Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* IoT Attack Surface Areas&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top IoT Vulnerabilities]&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Major Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added two sub-projects; ICS/SCADA and Firmware Analysis&lt;br /&gt;
* Daniel Miessler gave his IoT talk at DEFCON 23&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Access Control'''&lt;br /&gt;
|&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Cleartext usernames&lt;br /&gt;
* Cleartext passwords&lt;br /&gt;
* Third-party credentials&lt;br /&gt;
* Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Encryption (Symmetric, Asymmetric)&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, Zigbee, Bluetooth)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-  &lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= IoT Security Guideline =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Guideline Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Guideline provides follows :&lt;br /&gt;
&lt;br /&gt;
====== 1. Secure IoT Software Development Guideline ======&lt;br /&gt;
----&lt;br /&gt;
* Software(or SDK) Running on Device&lt;br /&gt;
* Software Running on IoT Cloud Platform(server-side)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====== 2. Secure IoT Hardware Development Guideline ======&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====== 3. Privacy Guideline for IoT Service/System ======&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Guideline Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Guideline Project provides:&lt;br /&gt;
&lt;br /&gt;
* Software Development Guideline&lt;br /&gt;
* Hardware Development Guideline&lt;br /&gt;
* Privacy Guideline&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Yunsoul Yunsoul]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Top_IoT_Vulnerabilities&amp;diff=216883</id>
		<title>Top IoT Vulnerabilities</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Top_IoT_Vulnerabilities&amp;diff=216883"/>
				<updated>2016-05-14T19:45:57Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project Back To Internet of Things Project]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The top IoT vulnerabilities (DRAFT) are as follow:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 IoT Vulnerabilities from 2014 are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''I1'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I1 Insecure Web Interface | Insecure Web Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I2'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I2 Insufficient Authentication/Authorization | Insufficient Authentication/Authorization]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I3'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I3 Insecure Network Services | Insecure Network Services]]&lt;br /&gt;
|-&lt;br /&gt;
| '''I4'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I4 Lack of Transport Encryption | Lack of Transport Encryption/Integrity Verification]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I5'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I5 Privacy Concerns | Privacy Concerns]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I6'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I6 Insecure Cloud Interface | Insecure Cloud Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I7'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I7 Insecure Mobile Interface | Insecure Mobile Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I8'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I8 Insufficient Security Configurability | Insufficient Security Configurability]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I9'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I9 Insecure Software/Firmware | Insecure Software/Firmware]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I10'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I10 Poor Physical Security | Poor Physical Security]]&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=216882</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=216882"/>
				<updated>2016-05-14T19:40:05Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* IoT Attack Surface Areas&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top IoT Vulnerabilities]&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Major Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added two sub-projects; ICS/SCADA and Firmware Analysis&lt;br /&gt;
* Daniel Miessler gave his IoT talk at DEFCON 23&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Access Control'''&lt;br /&gt;
|&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Cleartext usernames&lt;br /&gt;
* Cleartext passwords&lt;br /&gt;
* Third-party credentials&lt;br /&gt;
* Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Encryption (Symmetric, Asymmetric)&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, Zigbee, Bluetooth)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Top 10 IoT Vulnerabilities (2014) =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Top 10 IoT Vulnerabilities (2014) Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 IoT Vulnerabilities are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''I1'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I1 Insecure Web Interface | Insecure Web Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I2'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I2 Insufficient Authentication/Authorization | Insufficient Authentication/Authorization]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I3'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I3 Insecure Network Services | Insecure Network Services]]&lt;br /&gt;
|-&lt;br /&gt;
| '''I4'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I4 Lack of Transport Encryption | Lack of Transport Encryption/Integrity Verification]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I5'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I5 Privacy Concerns | Privacy Concerns]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I6'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I6 Insecure Cloud Interface | Insecure Cloud Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I7'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I7 Insecure Mobile Interface | Insecure Mobile Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I8'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I8 Insufficient Security Configurability | Insufficient Security Configurability]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I9'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I9 Insecure Software/Firmware | Insecure Software/Firmware]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I10'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I10 Poor Physical Security | Poor Physical Security]]&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Top 10 IoT Vulnerabiltiies Project? ==&lt;br /&gt;
&lt;br /&gt;
The Top 10 IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the top 10 internet of things vulnerabilities&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-  &lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= IoT Security Guideline =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Guideline Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Guideline provides follows :&lt;br /&gt;
&lt;br /&gt;
====== 1. Secure IoT Software Development Guideline ======&lt;br /&gt;
----&lt;br /&gt;
* Software(or SDK) Running on Device&lt;br /&gt;
* Software Running on IoT Cloud Platform(server-side)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====== 2. Secure IoT Hardware Development Guideline ======&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====== 3. Privacy Guideline for IoT Service/System ======&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Guideline Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Guideline Project provides:&lt;br /&gt;
&lt;br /&gt;
* Software Development Guideline&lt;br /&gt;
* Hardware Development Guideline&lt;br /&gt;
* Privacy Guideline&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Yunsoul Yunsoul]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=IoT_Framework_Assessment&amp;diff=216881</id>
		<title>IoT Framework Assessment</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=IoT_Framework_Assessment&amp;diff=216881"/>
				<updated>2016-05-14T19:39:10Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project Back To The Internet of Things Project]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== IoT Framework Security Considerations ==&lt;br /&gt;
&lt;br /&gt;
Designing a secure IoT solution depends on a number of security considerations.  One of the most important consideration is the use of a''' secure IoT framework''' for building your ecosystem.  Using a secure framework ensures that developers don't overlook security considerations and allows for rapid application development.  Ideally a framework contains security components baked into the framework in such a way as to provide security by default that developers don't have to think about.  This frees developers and architects to focus on features and capabilities without burdening their development efforts with security considerations (or mistakes).&lt;br /&gt;
&lt;br /&gt;
The purpose of this document is to outline a vendor agnostic set of evaluation criteria that developers and architects can use to measure relative security strengths of IoT development frameworks.  This should serve as a useful benchmark as well as impetus for vendors to produce more robust IoT development frameworks to address the many security issues that beleaguer IoT.&lt;br /&gt;
&lt;br /&gt;
Evaluation criteria are broken down into four distinct sections.  These sections are representative of typical IoT system archetypes.  Each section has specific security related concerns that are outlined in the framework evaluation criteria for that section.  These sections are:&lt;br /&gt;
&lt;br /&gt;
* Edge&lt;br /&gt;
* Gateway&lt;br /&gt;
* Cloud Platform&lt;br /&gt;
* Mobile&lt;br /&gt;
&lt;br /&gt;
=== Definitions ===&lt;br /&gt;
&lt;br /&gt;
The '''edge''' code that runs on actual IoT devices.  Often times edge components are resource constrained or operate in isolated environments.  A '''gateway''' device is often used to aggregate and bridge communications from edge devices.  The edge, or gateway, will often communicate with some sort of '''cloud''' component, often a web service.  This component could be deployed in a company data center or a public cloud computing environment.  The cloud component often supports complex user interfaces, analytics capabilities, and provide access to data aggregation back ends.  Finally, many IoT ecosystems consist of '''mobile''' application components that allow users to interact with the ecosystem via smart phones or tablets.&lt;br /&gt;
&lt;br /&gt;
== Edge ==&lt;br /&gt;
&lt;br /&gt;
The edge is the actual physical device that makes up the IoT ecosystem.  Note that in many deployments the edge is heterogeneous, meaning it is made up of any number of types of devices with different hardware, operating systems, networking or communications capability and resources.  An ideal framework will provide cross platform components so that edge code can be deployed anywhere from bare metal, to an embedded operating system, to a mobile OS, to a full blown desktop computer, and so on.&lt;br /&gt;
&lt;br /&gt;
=== Framework Considerations for Edge Component ===&lt;br /&gt;
&lt;br /&gt;
; Communications encryption&lt;br /&gt;
: Encrypted communications should occur end-to-end wherever possible.  Keep in mind that some communications may pass through a barrier, such as a gateway or load balancer, which may impact end-to-end encryption.  Encryption allows endpoints to validate identity (such as through x509 certificates and roots of trust) to ensure that communications cannot be intercepted or redirected.&lt;br /&gt;
; Storage encryption&lt;br /&gt;
: Sensitive data on the edge is liable to theft or exposure unless it is stored with proper security considerations.  Frameworks should offer some form of secured local storage for data that protects it from local malicious applications, compromised operating systems, or malicious owner/operator.  Sensitive data can include sensor reading, configuration settings, authentication credentials, or cryptographic keys.&lt;br /&gt;
; Strong logging&lt;br /&gt;
: The framework should offer robust logging, including security event logging.  The log events should be customizable and should report sensitive events in a usable format for end users, managers, and operators.  Logs often provide forensic evidence of abuse so integration with common log formats (such as Windows event logs or Unix syslog), allows for integration into more robust monitoring systems.&lt;br /&gt;
; Automatic updates and/or version reporting&lt;br /&gt;
: Keeping software up to date and allowing for patches and updates is critical for a secure framework.  The framework should clearly identify the running version and allow for software patches and updates.  An automatic updating process frees users from having to manually update systems, raising the likelihood that systems will be kept up to date.&lt;br /&gt;
; Update verification&lt;br /&gt;
: Updates should be delivered over a secured channel and verified after download to ensure that updates are legitimate.  Binary signing (and checking) and update hashes delivered over a verified, encrypted, channel ensure that malicious updates aren't installed on a device.  Be aware that physical access may allow an attacker to &amp;quot;side load&amp;quot; a binary to place it directly on a device so updates should be verified prior to installation rather than simply checking a download.&lt;br /&gt;
; Cryptographic identification capabilities &lt;br /&gt;
: IoT ecosystems are primarily comprised of autonomous systems which are extremely capable of performing complex cryptographic operations.  Frameworks should support cryptographic capabilities to verify trusted components (such as gateway, cloud, or mobile) and include cryptographic lifecycle management.  This means supporting the issuing, and re-issuing, of cryptographic material, expiration of cryptographic certificates, a revocation and revocation checking mechanism, and a system from signing key material.  This capability enables strong cryptographic authentication, which is particularly important with machine to machine (M2M) authentication and communications encryption.&lt;br /&gt;
; No default passwords&lt;br /&gt;
: The framework should support custom credentials that can be created, set, and reset by the operator.  The framework should eschew default or shared credentials across the ecosystem.  Credentials includes local authentication components as well as authentication components to cloud, gateway, mobile, or other ecosystem devices.&lt;br /&gt;
; Strong local authentication&lt;br /&gt;
: The framework should provide strong authentication of operators to the edge.  Where possible this should include complex passwords and multi-factor authentication.  The authentication mechanism should report or log failed authentication attempts and provide a exponential delay or lock out mechanism to prevent brute force attacks.&lt;br /&gt;
; Offline security features&lt;br /&gt;
: The framework should assume that the edge component may lose connectivity and fall back to local security features in the absence of network resources.  These offline security features should be just as robust as online features in order to prevent attackers from disrupting communications so as to degrade security countermeasures.&lt;br /&gt;
; Configurable root trust store&lt;br /&gt;
: Cryptographic roots of trust are critical for using certificates for identity validation.  These stores should be configurable in order to add new certificates and expire or remove revoked certificates to maintain forward compatible security.  The framework should enforce checks on the ability to manipulate the trust root.&lt;br /&gt;
; Device and owner authentication&lt;br /&gt;
: The framework should recognize that in an IoT ecosystem the device may need to authenticate as itself or broker identity of an owner or operator.  The identity model of the framework should recognize the unique access and authentication needs for both the autonomous component and the human user(s). &lt;br /&gt;
; Transitive ownership considerations&lt;br /&gt;
: IoT devices are often sold or ownership is transfered.  The framework should allow the device to be wiped, reset, or otherwise have data compartmentalized or destroyed to protect owner information.  Whether the device is a set piece in a physical location whose owner might change, or physically transferable to a potentially hostile or competitive owner, the framework should take into consideration the transitive nature of the device and allow for information protection accordingly.&lt;br /&gt;
; Defensive capabilities&lt;br /&gt;
: The framework should provide mechanisms to detect malicious and anomalous activity or integrate easily into device side malware protection or anomaly detection products.  To the extent possible the framework should support a self defending edge component.&lt;br /&gt;
; Plugin or extension verification, reporting and updating&lt;br /&gt;
: Additions and extensions to the edge components should be validated prior to installation by the framework.  The framework should support reporting and updating capabilities for extensions in the same manner as for the core.&lt;br /&gt;
; Secure M2M capabilities &lt;br /&gt;
: The framework should support machine to machine trust, authorization, verification, and authentication.  To the extent possible this support should extend to offline capabilities to avoid a single point of failure in a platform or gateway.  The framework might support transitive trust, so that an owner might certify a number of devices which could then authenticate and trust based on the owner, independent of the device or platform in the ecosystem.  The platform or gateway may also be able to confer transitive trust for M2M communications.&lt;br /&gt;
; Secure web interface&lt;br /&gt;
: Frameworks that provide an interface for edge components should utilize an interface that addresses the OWASP Top 10 at a minimum.  To the extent possible, web interfaces should be constructed with web application development frameworks that ensure security countermeasures against common vulnerabilities such as authentication bypass, cross site scripting and cross site request forgery.  Web interfaces should be presented over TLS (HTTPS) and should not use self signed or invalid certificates.  To the extent possible the framework should limit access to the web interface to prevent unauthorized use or abuse.&lt;br /&gt;
; Utilize established, tested networking stacks and protocols&lt;br /&gt;
: Frameworks should utilize well supported network stacks and protocols to avoid common security vulnerabilities in newer, untested, or exotic stacks and protocols.  Frameworks should limit the number of protocols to the minimum possible and should provide protocols or stacks in a disabled-by-default state to limit attack surface.&lt;br /&gt;
; Use latest, up to date third party components&lt;br /&gt;
: Frameworks should use up to date 3rd party components as well as the capability to report on versions and update these components as they age or security updates become available.  The framework should insure that any updates should be distributed over a secured channel and verified before installation.&lt;br /&gt;
; Capability to utilize hardware devices &lt;br /&gt;
: The framework should support the use of any available hardware security features such as Hardware Security Modules (HSM's), Trusted Platform Modules (TPM's), and cryptographic coprocessors.  The framework may not require these components, but should utilize them if available.&lt;br /&gt;
; Support multi-factor authentication&lt;br /&gt;
: The framework should support multi factor authentication for the device and/or any operators if possible.&lt;br /&gt;
; Support temporal and spacial authentication and functionality&lt;br /&gt;
: IoT devices might be moved and the framework should have the capability to fine tune permissions based on space and time.  The framework should support location aware permissions utilizing any number of the sensors on an edge device and should also support a permissions model that can change based on rules of time.&lt;br /&gt;
; Tracks and contains data from potentially tainted (insecure) sources&lt;br /&gt;
: IoT devices might be required to process data from channels that cannot be secured.  The framework should allow for some form of data tagging or sanitization to track and contain data from untrusted sources.&lt;br /&gt;
; Features (interfaces) are disabled by default&lt;br /&gt;
: The framework should strive to disable as many services and features as possible by default, allowing developers and deployment configuration to enable features as necessary in order to minimize attack surface.  The framework should allow for configuration reporting and potentially for remote configuration changes to respond to ecosystem changes.&lt;br /&gt;
; Written in a type safe programming language or subject to scrutiny&lt;br /&gt;
: Framework components for edge devices should be written in programming languages that posses security countermeasures and demonstrate a history of strong security.  Framework edge components written in languages prone to security issues, such as C, should be rigorously scrutinized to ensure that code level vulnerabilities, such as buffer overflows, are not present.&lt;br /&gt;
; Does not employ secrets in code&lt;br /&gt;
: The framework edge components should be architected in such a way as to recognize the likelihood of reverse engineering and physical compromise and employ defensive countermeasures to protect any secrets in the component.&lt;br /&gt;
; Device monitoring and management capabilities&lt;br /&gt;
: The framework should enable device platform monitoring, and possibly management, capabilities to allow for detection of security weaknesses or vulnerabilities in other components on the edge.&lt;br /&gt;
&lt;br /&gt;
== Gateway ==&lt;br /&gt;
&lt;br /&gt;
The gateway will often support weak edge devices, or allow edge devices a bridge networks to cloud components.  Gateways can serve as a communications aggregation and control bottleneck and can allow for an easy interface between an insecure, but trusted, local network, and a secure connection to the untrusted public internet.  Often times gateways will support range limited or proprietary protocols from edge devices and in many ecosystems the gateway and the edge might be synonymous, with sensors communicating to the edge which brokers those communications into the IoT ecosystem.  A gateway may, or may, not have any sort of user interface, which can present benefits and limitations to the device.  Typically gateways have greater resource availability than edge devices and run full operating system stacks.  Because it serves as an aggregation point, the gateway has a very security sensitive role in the ecosystem.&lt;br /&gt;
&lt;br /&gt;
=== Framework Considerations for Gateway Component ===&lt;br /&gt;
&lt;br /&gt;
; Multi-directional encrypted communications&lt;br /&gt;
: The gateway should enforce secure communications so as to not degrade the security of messages in any direction wherever possible.  Sometimes a gateway will bridge secured and unsecured communications channels, in which case careful consideration should be given to data interception, manipulation, and injection on insecure endpoints.  The gateway should provide capabilities to segment and isolate communications where possible as well.&lt;br /&gt;
; Strong authentication of components (edge, platform, user)&lt;br /&gt;
: Edge components should provide authentication mechanisms as strong as any other component in the framework.  Where possible the gateway should authenticate multidirectionally to ensure trusted communications to the edge and to the cloud.  Cryptographic capabilities in gateway authentication should be a strong component of the framework solution.&lt;br /&gt;
; Storage&lt;br /&gt;
: The gateway may serve as a single point of failure (or attack) in the ecosystem and should store only the minimum amount of information, in an encrypted format if possible.&lt;br /&gt;
; Denial of service and replay attack mitigation&lt;br /&gt;
:The gateway should be able to detect and resist attacks from the edge including spoofing, replay, and excessive communications.  The framework should support the ability of the gateway to log, alert, and respond to detected malicious or anomalous activity by the edge components.&lt;br /&gt;
; Logging and alerting&lt;br /&gt;
: The gateway will have access to a volume of traffic and should be able to log and alert based on event logging.  The framework might include integration with standard logging services or intrusion detection systems.  The framework might even support alternative methods for alerting in the gateway (such as SMS).&lt;br /&gt;
; Anomaly detection and reporting capabilities&lt;br /&gt;
: The framework should allow the gateway to observe, baseline, and monitor communications traffic and behavior of components.  The gateway will be uniquely suited to monitor traffic to and from the cloud and should support anomaly detection or integrate easily with anomaly and intrusion detection systems.  A strong gateway framework might even support intrusion prevention capabilities to exclude suspicious actors from the ecosystem.&lt;br /&gt;
; Use latest, up to date third party components&lt;br /&gt;
: Frameworks should use up to date 3rd party components as well as the capability to report on versions and update these components as they age or security updates become available.  The framework should insure that any updates should be distributed over a secured channel and verified before installation.&lt;br /&gt;
; Automatic updates and/or version reporting&lt;br /&gt;
: Keeping software up to date and allowing for patches and updates is critical for a secure framework.  The framework should clearly identify the running version and allow for software patches and updates.  An automatic updating process frees users from having to manually update systems, raising the likelihood that systems will be kept up to date.&lt;br /&gt;
&lt;br /&gt;
== Cloud == &lt;br /&gt;
&lt;br /&gt;
The cloud component of an IoT ecosystem refers to the central data aggregation and management portion of the ecosystem.  The cloud component will typically consist of a data storage layer (such as a database), analytics and reporting, ecosystem management, a web interface, and other components such as e-mail, backups, etc.  The cloud component may or may not be hosted on public cloud infrastructure.  Access to the cloud component is typically restricted, especially to the supporting infrastructure.  The cloud component carries significant risk because it is the central point of aggregation for most data in the ecosystem and often includes a command and control (C2) component that allows for the manipulation of other components including the delivery and distribution of updates and extensions.  It is critical that the cloud component contains extensive and effective security controls since it is the keystone of most IoT ecosystems.&lt;br /&gt;
&lt;br /&gt;
=== Framework Considerations for Cloud Component ===&lt;br /&gt;
&lt;br /&gt;
; Encrypted communications&lt;br /&gt;
: The cloud component should support encrypted communications including security certificates to identify itself to other components in the ecosystem.  The framework should support cryptographic certificates to identify other components as well, for bi-directional identity verification.&lt;br /&gt;
; Secure web interface&lt;br /&gt;
: The cloud web interface should be build using technology that bakes solutions to common web application vulnerabilities in to the code (such as a secure web application development framework).  The application should mitigate the OWASP Top 10 at a minimum.&lt;br /&gt;
; Authentication &lt;br /&gt;
: The cloud component should allow for complex authentication including multi factor authentication.  The interface should include brute force and anti-account enumeration mitigation features as well.  The interface should not ship with default credentials and should allow users to easily set, and safely reset, account information.&lt;br /&gt;
; Secure Authentication Credentials&lt;br /&gt;
: Authentication credentials, in any form (passwords, device id's, etc.), should be appropriately salted and hashed, on encrypted, prior to storage (https://www.owasp.org/index.php/Password_Storage_Cheat_Sheet).  Storage mechanisms should be uniformly strong and should extend beyond passwords to address machine authentication credentials in any form.&lt;br /&gt;
; Encrypted storage&lt;br /&gt;
: The cloud component of an IoT ecosystem is often the system of record and aggregation for the entire deployment.  Wherever possible the framework should support data encryption at rest, including in the persistence layer as well as in any export or backup mechanism.&lt;br /&gt;
; Capability to utilize encrypted communications to storage layer&lt;br /&gt;
: Communications between the cloud interface and data aggregation layer and the data persistence layer should utilize encrypted communications channel.  The framework should utilize encrypted communications by default to prevent data from being exposed in transit.&lt;br /&gt;
; Data classification capabilities and segregation&lt;br /&gt;
: The cloud component will collect a variety of varying data from other components in the ecosystem.  Some data might be highly sensitive and other data might be benign.  The framework should provide the capabilities to classify data and protect data dependent on classification.  Interface controls should limit access and exposure of sensitive data according to classification.&lt;br /&gt;
; Security event reporting and alerting&lt;br /&gt;
: The cloud component often has the greatest visibility into ecosystem function and security controls are critical at this layer.  The cloud component should have robust security event monitoring, reporting, and alerting capabilities.  The framework should enable the cloud component to detect and react to malicious activity.  The cloud component should be able to segregate bad actors, limit access to malicious parties, and integrate easily with third party logging and intrusion detection and prevention systems.&lt;br /&gt;
; Automatic updates and update verification&lt;br /&gt;
: The framework should recognize the need for updates and support easy updates and update verification of the cloud component.  The framework should have an easy interface for reporting versions and any available updates.  Ideally the framework should support automatic updates to the cloud component.  Automated alerting of updates out of band (for instance via SMS or e-mail) is desirable for non-automatically updating components.&lt;br /&gt;
; Use latest, up to date third party components&lt;br /&gt;
: Frameworks should use up to date 3rd party components as well as the capability to report on versions and update these components as they age or security updates become available.  The framework should insure that any updates should be distributed over a secured channel and verified before installation.&lt;br /&gt;
; Plugin or extension verification, reporting and updating&lt;br /&gt;
: The cloud component will often have enhancements and customization options in the form of extensions and plug-ins.  The framework should allow for modular updates and monitoring of these components.  The framework should ideally ship with a minimal set of features enabled by default to limit attack surface.  An easy accounting interface for extensions and plug-ins should be available to administrators.  Automated alerting of updates out of band (for instance via SMS or e-mail) is desirable for non-automatically updating components.&lt;br /&gt;
; Interface segregation and isolation based on utility (device, management interface, user interface, etc.)&lt;br /&gt;
: The cloud component of an IoT ecosystem will often communicate with various other components of the ecosystem.  The utility necessary to communicate with an embedded device will necessarily be very different from the utility provided to a human user of a web interface.  The framework should allow for the segregation and protection of communications channels to reduce the attack surface and enforce the principle of least privilege.  Attackers may seek to exploit vulnerabilities available to non-human facing interfaces, such as device facing API's.  To the extent possible the framework should limit access based on role and use.  Cryptographic certificates utilized for purpose access can be useful in this goal.  At the very least the framework should provide purpose built interfaces customized for intended use.&lt;br /&gt;
; Application level firewall and defensive capabilities (IP blocking, throttling, account management, etc.)&lt;br /&gt;
: The cloud component should have the capability to block certain actors, throttle malicious activity and respond to threats.  This should include the capability for the framework to perform mass credential resets, deprecations, and other disaster and breach response capabilities.&lt;br /&gt;
; Ensure ecosystem segregation in the case of multi-tenant solutions&lt;br /&gt;
: In the case that the framework supports diverse customer base in a single ecosystem the framework should provide appropriate segregation and data protection.  This might include dedicated data storage layers per customer, or data tagging to ensure segregation and access control.&lt;br /&gt;
; Stack security considerations (no web UI to execute arbitrary code)&lt;br /&gt;
: Recognizing the complexity and multitude of component security configurations the framework should support full stack security solutions in the cloud component.  This includes security countermeasures and integrations on all layers of the cloud component, including potentially integration with cloud provider specific security  countermeasures such as isolation or intrusion detection.  The cloud component should include secure configuration management and integration with other system automatic updates.&lt;br /&gt;
; Audit capability&lt;br /&gt;
: In many ecosystems it is critical to track communications to ensure their proper delivery and timeframe.  Frameworks should provide mechanisms to ensure delivery of targeted messages to specific edge components.  This feature will allow confidence in audit and troubleshooting and can be used to support delivery guarantees of security sensitive instructions or data.  This audit should be bidirectional to allow for tracking of messages to the edge and receipt of messages from the edge.&lt;br /&gt;
&lt;br /&gt;
== Mobile ==&lt;br /&gt;
&lt;br /&gt;
Mobile interfaces in IoT deployments vary in capabilities and integration.  Some mobile applications merely provide limited data reporting from specific edge devices, others allow for the manipulation of edge components, and still others provide a full view analytics and cloud management capabilities.  Particular care and attention should be paid to mobile components in IoT ecosystems since they typically are deployed beyond the boundaries of device management, can grant privileged access to alter, adulterate or expose sensitive information, may have the capability to actuate edge devices, are portable and can easily fall into malicious hands.  Mobile components may carry many of the same risks as cloud components but are often given less security consideration and are exempt from the robust physical and access security controls that can be placed on cloud components.&lt;br /&gt;
&lt;br /&gt;
=== Framework Considerations for Mobile Component ===&lt;br /&gt;
&lt;br /&gt;
; Ensure mobile component enforces authentication requirements equal or greater to other components&lt;br /&gt;
: The limited interface and storage capabilities of mobile applications often encourages simplistic authentication mechanism.  Recognizing that attackers will find and target the weakest component of the ecosystem the framework should ensure that mobile authentication mechanisms don't degrade auth requirements.&lt;br /&gt;
; Local storage security considerations &lt;br /&gt;
: The framework should be mindful of the sometimes limited storage security on mobile devices.  The threat of theft or loss also means that local storage could fall into malicious hands.  The framework should strictly limit the amount of data stored on the device and the data should be encrypted where possible.&lt;br /&gt;
; Capabilities to disable or revoke mobile components in the case of theft or loss&lt;br /&gt;
: The framework should support the ability to deprovision mobile components quickly and easily to support response in the case of mobile device theft or loss.&lt;br /&gt;
; Strong audit trail of mobile interactions &lt;br /&gt;
: Because the mobile device might fall into malicious hands it is critical to keep a security audit trail of mobile application interactions with the ecosystem.  The framework should support robust logging and appropriate credentials to track interactions from mobile components to support forensics and in cases were mobile devices were discovered to be used maliciously after the fact.&lt;br /&gt;
; Mobile application should perform cryptographic verification and validation of other components&lt;br /&gt;
: Where possible the mobile framework should support cryptographic verification and validation of the other components during interactions.  Proper certificate checking and authentication should always take place.&lt;br /&gt;
; Encrypted communications channels&lt;br /&gt;
: Mobile devices are particularly prone to use in hostile networks and encrypted communications should be the framework default.  Mobile application should operate under the assumption of a hostile observer who will attempt to inspect, interdict, interrupt, replay and otherwise manipulate traffic.&lt;br /&gt;
; Multi-factor authentication&lt;br /&gt;
: Mobile devices have extended capabilities to perform multiple factors of authentication.  Sensors and biometrics should be supported by the framework for extended security checking on the mobile platform.&lt;br /&gt;
; Capability to utilize mobile component to enhance authentication and alerting for other components&lt;br /&gt;
: Where possible the mobile component should integrate into authentication and alerting for events at other components.  Edge, gateway, or cloud components might alert to the mobile framework, or the mobile framework might allow for multi factor authentication or enhance authentication to other components.&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Principles_of_IoT_Security&amp;diff=216880</id>
		<title>Principles of IoT Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Principles_of_IoT_Security&amp;diff=216880"/>
				<updated>2016-05-14T19:38:36Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project Back To The Internet of Things Project]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Principles of IoT Security ==&lt;br /&gt;
&lt;br /&gt;
# '''Assume a Hostile Edge'''&lt;br /&gt;
#* Edge components are likely to fall into adversarial hands.  Assume attackers will have physical access to edge components and can manipulate them, move them to hostile networks, and control resources such as DNS, DHCP, and internet routing.&lt;br /&gt;
# '''Test for Scale'''&lt;br /&gt;
#* The volume of IoT means that every design and security consideration must also take into account scale.  Simple bootstrapping into an ecosystem can create a self denial of service condition at IoT scale.  Security countermeasures must perform at volume.&lt;br /&gt;
# '''Internet of Lies'''&lt;br /&gt;
#* Automated systems are extremely capable of presenting misinformation in convincing formats.  IoT systems should always verify data from the edge in order to prevent autonomous misinformation from tainting a system.&lt;br /&gt;
# '''Exploit Autonomy'''&lt;br /&gt;
#* Automated systems are capable of complex, monotonous, and tedious operations that human users would never tolerate.  IoT systems should seek to exploit this advantage for security.&lt;br /&gt;
# '''Expect Isolation'''&lt;br /&gt;
#* The advantage of autonomy should also extend to situations where a component is isolated.  Security countermeasures must never degrade in the absence of connectivity.&lt;br /&gt;
# '''Protect Uniformly'''&lt;br /&gt;
#* Data encryption only protects encrypted pathways.  Data that is transmitted over an encrypted link is still exposed at any point it is unencrypted, such as prior to encryption, after decryption, and along any communications pathways that do not enforce encryption.  Careful consideration must be given to full data lifecycle to ensure that encryption is applied uniformly and appropriately to guarantee protections.  Encryption is not total - be aware that metadata about encrypted data might also provide valuable information to attackers.&lt;br /&gt;
# '''Encryption is Tricky'''&lt;br /&gt;
#* It is very easy for developers to make mistakes when applying encryption.  Using encryption but failing to validate certificates, failing to validate intermediate certificates, failing to encrypt traffic with a strong key, using a uniform seed, or exposing private key material are all common pitfalls when deploying encryption.  Ensure a thorough review of any encryption capability to avoid these mistakes.&lt;br /&gt;
# '''System Hardening'''&lt;br /&gt;
#* Be sure that IoT components are stripped down to the minimum viable feature set to reduce attack surface.  Unused ports and protocols should be disabled, and unnecessary supporting software should be uninstalled or turned off.  Be sure to track third party components and update them where possible.&lt;br /&gt;
# '''Limit what you can'''&lt;br /&gt;
#* To the extent possible limit access based on acceptable use criteria.  There's no advantage in exposing a sensor interface to the entire internet if there's no good case for a remote user in a hostile country.  Limit access to white lists of rules that make sense.&lt;br /&gt;
# '''Lifecycle Support'''&lt;br /&gt;
#* IoT systems should be able to quickly onboard new components, but should also be capable of re-credentialing existing components, and deprovisioning components for a full device lifecycle.  This capability should include all components in the ecosystem from devices to users.&lt;br /&gt;
# '''Data in Aggregate is Unpredictable'''&lt;br /&gt;
#* IoT systems are capable of collecting vast quantities of data that my seem innocuous at first, but complex data analysis may reveal very sensitive patterns or information hidden in data.  IoT systems must prepare for the data stewardship responsibilities of unexpected information sensitivity that may only be revealed after an ecosystem is deployed.&lt;br /&gt;
# '''Plan for the Worst'''&lt;br /&gt;
#* IoT systems should have capabilities to respond to compromises, hostile participants, malware, or other adverse events.  There should be features in place to re-issue credentials, exclude participants, distribute security patches and updates, and so on, before they are ever necessary.&lt;br /&gt;
# '''The Long Haul'''&lt;br /&gt;
#* IoT system designers must recognize the extended lifespan of devices will require forward compatible security features.  IoT ecosystems must be capable of aging in place and still addressing evolving security concerns.  New encryption, advances in protocols, new attack methods and techniques, and changing topology all necessitate that IoT systems be capable of addressing emerging security concerns for years after they are deployed.&lt;br /&gt;
# '''Attackers Target Weakness'''&lt;br /&gt;
#* Ensure that security controls are equivalent across interfaces in an ecosystem.  Attackers will identify the weakest component and attempt to exploit it.  Mobile interfaces, hidden API's, or resource constrained environments must enforce security in the same way as more robust or feature rich interfaces.  Using multi-factor authentication for a web interface is useless if a mobile application allows access to the same API's with a four digit PIN.&lt;br /&gt;
# '''Transitive Ownership'''&lt;br /&gt;
#* IoT components are often sold or transferred during their lifespan.  Plan for this eventuality and be sure IoT systems can protect and isolate data to enable safe transfer of ownership, even if a component is sold or transferred to a competitor or attacker.&lt;br /&gt;
# '''N:N Authentication'''&lt;br /&gt;
#* Realize that IoT does not follow a traditional 1:1 model of users to applications.  Each component may have more than one user and a user may interact with multiple components.  Several users might access different data or capabilities on a single device, and one user might have varying rights to multiple devices.  Multiple devices may need to broker permissions on behalf of a single user account, and so on.  Be sure the IoT system can handle these complex trust and authentication schemes.&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=IoT_Security_Guidance&amp;diff=216879</id>
		<title>IoT Security Guidance</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=IoT_Security_Guidance&amp;diff=216879"/>
				<updated>2016-05-14T19:38:00Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project Back To The Internet of Things Project]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Manufacturer IoT Security Guidance''' ==&lt;br /&gt;
&lt;br /&gt;
(DRAFT) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The goal of this section is help manufacturers build more secure products in the Internet of Things space. The guidance below is at a basic level, giving builders of products a basic set of guidelines to consider from their perspective. This is not a comprehensive list of considerations, and should not be treated as such, but ensuring that these fundamentals are covered will greatly improve the security of any IoT product.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Category&lt;br /&gt;
! IoT Security Consideration&lt;br /&gt;
|- &lt;br /&gt;
| '''I1: Insecure Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure that any web interface in the product disallows weak passwords&lt;br /&gt;
* Ensure that any web interface in the product has an account lockout mechanism&lt;br /&gt;
* Ensure that any web interface in the product has been tested for XSS, SQLi and CSRF vulnerabilities&lt;br /&gt;
* Ensure that any web interface has the ability to use HTTPS to protect transmitted information&lt;br /&gt;
* Include web application firewalls to protect any web interfaces&lt;br /&gt;
* Ensure that any web interface allows the owner to change the default username and password&lt;br /&gt;
|- &lt;br /&gt;
| '''I2: Insufficient Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure that any access requiring authentication requires strong passwords&lt;br /&gt;
* Ensure that user roles can be properly segregated in multi-user environments&lt;br /&gt;
* Implement two-factor authentication where possible&lt;br /&gt;
* Ensure password recovery mechanisms are secure&lt;br /&gt;
* Ensure that users have the option to require strong passwords&lt;br /&gt;
* Ensure that users have the option to force password expiration after a specific period&lt;br /&gt;
* Ensure that users have the option to change the default username and password&lt;br /&gt;
|- &lt;br /&gt;
| '''I3: Insecure Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure all devices operate with a minimal number of network ports active&lt;br /&gt;
* Ensure all devices do not make network ports and/or services available to the internet via UPnP for example&lt;br /&gt;
* Review all required network services for vulnerabilities such as buffer overflows or denial of service&lt;br /&gt;
|- &lt;br /&gt;
| '''I4: Lack of Transport Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure all communication between system components is encrypted as well as encrypting traffic between the system or device and the internet&lt;br /&gt;
* Use recommended and accepted encryption practices and avoid proprietary protocols&lt;br /&gt;
* Ensure SSL/TLS implementations are up to date and properly configured&lt;br /&gt;
* Consider making a firewall option available for the product&lt;br /&gt;
|- &lt;br /&gt;
| '''I5: Privacy Concerns'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure only the minimal amount of personal information is collected from consumers&lt;br /&gt;
* Ensure all collected personal data is properly protected using encryption at rest and in transit&lt;br /&gt;
* Ensure only authorized individuals have access to collected personal information&lt;br /&gt;
* Ensure only less sensitive data is collected&lt;br /&gt;
* Ensuring data is de-identified or anonymized&lt;br /&gt;
* Ensuring a data retention policy is in place&lt;br /&gt;
* Ensuring end-users are given a choice for data collected beyond what is needed for proper operation of the device&lt;br /&gt;
|- &lt;br /&gt;
| '''I6: Insecure Cloud Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure all cloud interfaces are reviewed for security vulnerabilities (e.g. API interfaces and cloud-based web interfaces)&lt;br /&gt;
* Ensure that any cloud-based web interface disallows weak passwords&lt;br /&gt;
* Ensure that any cloud-based web interface has an account lockout mechanism&lt;br /&gt;
* Implement two-factor authentication for cloud-based web interfaces&lt;br /&gt;
* Ensure that all cloud interfaces use transport encryption&lt;br /&gt;
* Ensure that any cloud-based web interface has been tested for XSS, SQLi and CSRF vulnerabilities&lt;br /&gt;
* Ensure that users have the option to require strong passwords&lt;br /&gt;
* Ensure that users have the option to force password expiration after a specific period&lt;br /&gt;
* Ensure that users have the option to change the default username and password&lt;br /&gt;
|- &lt;br /&gt;
| '''I7: Insecure Mobile Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure that any mobile application disallows weak passwords&lt;br /&gt;
* Ensure that any mobile application has an account lockout mechanism&lt;br /&gt;
* Implement two-factor authentication for mobile applications (e.g Apple's Touch ID)&lt;br /&gt;
* Ensure that any mobile application uses transport encryption&lt;br /&gt;
* Ensure that users have the option to require strong passwords&lt;br /&gt;
* Ensure that users have the option to force password expiration after a specific period&lt;br /&gt;
* Ensure that users have the option to change the default username and password&lt;br /&gt;
|- &lt;br /&gt;
| '''I8: Insufficient Security Configurability'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure password security options are made available (e.g. Enabling 20 character passwords or enabling two-factor authentication)&lt;br /&gt;
* Ensure encryption options are made available (e.g. Enabling AES-256 where AES-128 is the default setting)&lt;br /&gt;
* Ensure secure logging is available for security events&lt;br /&gt;
* Ensure alerts and notifications are available to the user for security events&lt;br /&gt;
|- &lt;br /&gt;
| '''I9: Insecure Software/Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure all system devices have update capability and can be updated quickly when vulnerabilities are discovered&lt;br /&gt;
* Ensure update files are encrypted and that the files are also transmitted using encryption&lt;br /&gt;
* Ensure that update files are signed and then validated by the device before installing&lt;br /&gt;
* Ensure update servers are secure&lt;br /&gt;
* Ensure the product has the ability to implement scheduled updates&lt;br /&gt;
|- &lt;br /&gt;
| '''I10: Poor Physical Security'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure the device is produced with a minimal number of physical external ports (e.g. USB ports)&lt;br /&gt;
* Ensure the firmware of Operating System can not be accessed via unintended methods such as through an unnecessary USB port&lt;br /&gt;
* Ensure the product is tamper resistant&lt;br /&gt;
* Ensure the product has the ability to limit administrative capabilities in some fashion, possibly by only connecting locally for admin functions&lt;br /&gt;
* Ensure the product has the ability to disable external ports such as USB&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===General Recommendations===&lt;br /&gt;
&lt;br /&gt;
Consider the following recommendation for all Internet of Things products:&lt;br /&gt;
* Avoid the potential for persistent vulnerabilities in devices that have no update capability by ensuring that all devices and systems are built with the ability to be updated when vulnerabilities are discovered&lt;br /&gt;
* Rebranded devices used as part of a system should be properly configured so that unnecessary or unintended services do not remain active after the rebranding&lt;br /&gt;
&lt;br /&gt;
[ NOTE: Given the fact that each deployment and every environment is different, it is important to weigh the pros and cons of implementing the advice above before taking each step. ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Developer IoT Security Guidance''' ==&lt;br /&gt;
&lt;br /&gt;
(DRAFT)&lt;br /&gt;
&lt;br /&gt;
The goal of this section is help developers build more secure applications in the Internet of Things space. The guidance below is at a basic level, giving developers of applications a basic set of guidelines to consider from their perspective. This is not a comprehensive list of considerations, and should not be treated as such, but ensuring that these fundamentals are covered will greatly improve the security of any IoT product.  Strongly consider using a [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Framework_Assessment Secure IoT Framework] in order to proactively address many of the concerns listed below.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:left;&amp;quot;&lt;br /&gt;
! Category&lt;br /&gt;
! IoT Security Consideration&lt;br /&gt;
! Recommendations&lt;br /&gt;
|- style=&amp;quot;vertical-align:top;&amp;quot;&lt;br /&gt;
| '''I1: Insecure Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure that any web interface coding is written to prevent the use of weak passwords&lt;br /&gt;
* Ensure that any web interface coding is written to include an account lockout mechanism&lt;br /&gt;
* Ensure that any web interface coding has been tested for XSS, SQLi and CSRF vulnerabilities&lt;br /&gt;
* Ensure that any web interface has the ability to use HTTPS to protect transmitted information&lt;br /&gt;
* Ensure that any web interface coding is written to allow the owner to change the username and password&lt;br /&gt;
* Consider the use of web application firewalls to protect any web interfaces&lt;br /&gt;
|&lt;br /&gt;
When building a web interface consider implementing lessons learned from web application security.  Employ a [https://www.owasp.org/index.php/OWASP_Periodic_Table_of_Vulnerabilities#Generic_Application_Frameworks framework] that utilizes security controls to ensure that vulnerabilities are mitigated in code.  Be sure to plan for eventual upgrades or security fixes to the framework as well.  If you use optional plugins to the framework be sure to review them for security.&lt;br /&gt;
&lt;br /&gt;
Deploy and protect the web interface in the same way you would any web application.  Utilize encrypted transport protocols if possible, being sure to validate certificates.  Limit access in whatever ways possible.  Assume users will not change configuration so deploy in a secure manner with strong credentials already in place.&lt;br /&gt;
|- style=&amp;quot;vertical-align:top;&amp;quot;&lt;br /&gt;
| '''I2: Insufficient Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure that applications are written to require strong passwords where authentication is needed&lt;br /&gt;
* Ensure the application takes into account multi-user environments and includes functionality for role separation&lt;br /&gt;
* Implement two-factor authentication where possible&lt;br /&gt;
* Ensure password recovery mechanisms are written to function in a secure manner&lt;br /&gt;
* Ensure that applications are written to include the option to require strong passwords&lt;br /&gt;
* Ensure that applications are written to include the option to force password expiration after a specific period&lt;br /&gt;
* Ensure that applications are written to include the option to change the default username and password&lt;br /&gt;
|&lt;br /&gt;
Refer to the [https://www.owasp.org/index.php/Authentication_Cheat_Sheet OWASP Authentication Cheat Sheet]&lt;br /&gt;
|- style=&amp;quot;vertical-align:top;&amp;quot;&lt;br /&gt;
| '''I3: Insecure Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure applications that use network services don't respond poorly to buffer overflow, fuzzing or denial of service attacks&lt;br /&gt;
* Ensure applications test ports are taken out of service before going to production&lt;br /&gt;
|&lt;br /&gt;
Try to utilize tested, proven, networking stacks and interfaces that handle exceptions gracefully.  Be sure that any test or maintenance interfaces are disabled or properly protected.  Avoid exposing unauthenticated protocols (such as TFTP) or unencrypted channels (such as telnet) if possible.  Consider the attack surface that device network services present.  Turn off unnecessary services and deploy measures to protect required services, detect malicious activity, and react to an attack with measures such as lock-outs or temporary firewall rules.&lt;br /&gt;
|- style=&amp;quot;vertical-align:top;&amp;quot;&lt;br /&gt;
| '''I4: Lack of Transport Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure all applications are written to make use of encrypted communication between devices and between devices and the internet&lt;br /&gt;
* Use recommended and accepted encryption practices and avoid proprietary protocols&lt;br /&gt;
* Consider making a firewall option available for the application&lt;br /&gt;
|&lt;br /&gt;
Utilize encrypted protocols wherever possible to protect all data in transit.  Where protocol encryption is not possible consider encrypting data before transfer.&lt;br /&gt;
|- style=&amp;quot;vertical-align:top;&amp;quot;&lt;br /&gt;
| '''I5: Privacy Concerns'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure only the minimal amount of personal information is collected from consumers&lt;br /&gt;
* Ensure all collected personal data is properly protected using encryption at rest and in transit&lt;br /&gt;
* Ensuring data is de-identified or anonymized&lt;br /&gt;
* Ensuring end-users are given a choice for data collected beyond what is needed for proper operation of the device&lt;br /&gt;
|&lt;br /&gt;
Data can present unintended privacy concerns when aggregated.  As a rule collect the minimal amount of data possible.  Consult with data scientists, legal and compliance teams to determine risk of data collection and storage.  Consider implications of consent and the fact that IoT devices may not present an interface for collecting consent and may passively collect data about people other than owners and operators.  IoT may collect information about individuals who cannot provide consent (such as minors) and data collection should be modified accordingly.&lt;br /&gt;
|- style=&amp;quot;vertical-align:top;&amp;quot;&lt;br /&gt;
| '''I6: Insecure Cloud Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure all cloud interfaces are reviewed for security vulnerabilities (e.g. API interfaces and cloud-based web interfaces)&lt;br /&gt;
* Ensure that any cloud-based web interface coding is written to disallows weak passwords&lt;br /&gt;
* Ensure that any cloud-based web interface coding is written to include an account lockout mechanism&lt;br /&gt;
* Implement two-factor authentication for cloud-based web interfaces&lt;br /&gt;
* Ensure that any cloud interface coding has been tested for XSS, SQLi and CSRF vulnerabilities&lt;br /&gt;
* Ensure that all cloud interfaces use transport encryption&lt;br /&gt;
* Ensure that cloud interfaces are written to include the option to require strong passwords&lt;br /&gt;
* Ensure that cloud interfaces are written to include the option to force password expiration after a specific period&lt;br /&gt;
* Ensure that cloud interfaces are written to include the option to change the default username and password&lt;br /&gt;
|&lt;br /&gt;
Cloud security presents unique security considerations, as well as countermeasures.  Be sure to consult your cloud provider about options for security mechanisms.  Consult the OWASP [https://www.owasp.org/index.php/Category:OWASP_Cloud_%E2%80%90_10_Project Cloud Top 10 Security Risks] documents.&lt;br /&gt;
|- style=&amp;quot;vertical-align:top;&amp;quot;&lt;br /&gt;
| '''I7: Insecure Mobile Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure that any mobile application coding is written to disallows weak passwords&lt;br /&gt;
* Ensure that any mobile application coding is written to include an account lockout mechanism&lt;br /&gt;
* Implement two-factor authentication for mobile applications (e.g Apple's Touch ID)&lt;br /&gt;
* Ensure that any mobile application uses transport encryption&lt;br /&gt;
* Ensure that mobile interfaces are written to include the option to require strong passwords&lt;br /&gt;
* Ensure that mobile interfaces are written to include the option to force password expiration after a specific period&lt;br /&gt;
* Ensure that mobile interfaces are written to include the option to change the default username and password&lt;br /&gt;
* Ensure that mobile interfaces only collect the minimum amount of personal information needed&lt;br /&gt;
|&lt;br /&gt;
Mobile interfaces to IoT ecosystems require targeted security.  Consult the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Project] for further guidance.&lt;br /&gt;
|- style=&amp;quot;vertical-align:top;&amp;quot;&lt;br /&gt;
| '''I8: Insufficient Security Configurability'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure applications are written to include password security options (e.g. Enabling 20 character passwords or enabling two-factor authentication)&lt;br /&gt;
* Ensure applications are written to include encryption options (e.g. Enabling AES-256 where AES-128 is the default setting)&lt;br /&gt;
* Ensure all applications are written to produce logs for security events&lt;br /&gt;
* Ensure all applications are written to produce alerts and notifications to the user for security events&lt;br /&gt;
|&lt;br /&gt;
Security can be a value proposition.  Design should take into consideration a sliding scale of security requirements.  Architect projects with secure defaults and allow consumers to select options to be enabled or disabled.  IoT design should be forward compatible with respect to security - as cipher suites increase and new security technologies become widely available IoT design should be able to adopt these new technologies.&lt;br /&gt;
&lt;br /&gt;
Remember the security lifecycle of protect, detect, and react.  Design systems to allow for the detection of malicious activity as well as self defending capabilities and a reaction plan should a compromise be detected.  Design all stages of the lifecycle to be evolutionary so improvements can be added to a system or device future releases, updates, or patches.&lt;br /&gt;
|- style=&amp;quot;vertical-align:top;&amp;quot;&lt;br /&gt;
| '''I9: Insecure Software/Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure all applications are written to include update capability and can be updated quickly when vulnerabilities are discovered&lt;br /&gt;
* Ensure all applications are written to process encrypted update files and that the files are transmitted using encryption&lt;br /&gt;
* Ensure all applications are written to process signed files and then validate that file before installation&lt;br /&gt;
|&lt;br /&gt;
Many IoT deployments are either brownfield (i.e. applied over existing infrastructure) and/or have an extremely long deployment cycle.  To maintain the security of devices over time it is critical to plan for patches and updates.&lt;br /&gt;
&lt;br /&gt;
Confidentiality, Integrity, and Availability (CIA) are primary concerns when providing binaries and updates to edge devices.  Encrypt updates before distribution, providing decryption keys along with download instructions to authorized devices.  Updates should have cryptographic signatures using public key cryptography that can be verified by devices.  A cryptographic signature allows for distribution of updates over untrusted channels, such as Content Delivery Network (CDN), peer-to-peer, or machine to machine (M2M).&lt;br /&gt;
&lt;br /&gt;
Devices should always validate cryptographic certificates and discard updates that are not properly delivered or signed.  If unencrypted updates are utilized be sure that a cryptographic hash of the update is provided over an encrypted channel so the device can detect tampering.&lt;br /&gt;
&lt;br /&gt;
Provide a mechanism for issuing, updating and revoking cryptographic keys as well.  Key management and lifecycle should be taken into consideration prior to deployment.  This includes the SSL trust store, or root trust, on a device, which may have to be modified over the lifespan of the device.&lt;br /&gt;
|- style=&amp;quot;vertical-align:top;&amp;quot;&lt;br /&gt;
| '''I10: Poor Physical Security'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure applications are written to utilize a minimal number of physical external ports (e.g. USB ports) on the device&lt;br /&gt;
* Ensure all applications can not be accessed via unintended methods such as through an unnecessary USB port&lt;br /&gt;
* Ensure all applications are written to allow for disabling of unused physical ports such as USB&lt;br /&gt;
* Consider writing applications to limit administrative capabilities to a local interface only&lt;br /&gt;
|&lt;br /&gt;
Plan on having IoT edge devices fall into malicious hands.  Utilize whatever physical security protections are available.  Disable any testing or debugging interfaces, utilize Hardware Security Modules (HSM's), cryptographic co-processors, and Trusted Platform Modules (TPM's) wherever possible.  &lt;br /&gt;
&lt;br /&gt;
Consider the implications of a compromised device.  Do not share credentials, application or cryptographic keys across multiple devices to limit the scope of damage due to a physical compromise.&lt;br /&gt;
&lt;br /&gt;
Plan for the transfer of ownership of devices and ensure that data is not transferable along with the ownership.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===General Recommendations===&lt;br /&gt;
&lt;br /&gt;
Consider the following recommendations for all user interfaces (local device, cloud-based and mobile):&lt;br /&gt;
* Avoid potential Account Harvesting issues by:&lt;br /&gt;
** Ensuring valid user accounts can't be identified by interface error messages&lt;br /&gt;
** Ensuring strong passwords are required by users&lt;br /&gt;
** Implementing account lockout after 3 - 5 failed login attempts&lt;br /&gt;
&lt;br /&gt;
[ NOTE: Given the fact that each deployment and every environment is different, it is important to weigh the pros and cons of implementing the advice above before taking each step. ]&lt;br /&gt;
&lt;br /&gt;
== '''Consumer IoT Security Guidance''' ==&lt;br /&gt;
&lt;br /&gt;
(DRAFT)&lt;br /&gt;
&lt;br /&gt;
The goal of this section is help consumers purchase secure products in the Internet of Things space. The guidance below is at a basic level, giving consumers a basic set of guidelines to consider from their perspective. This is not a comprehensive list of considerations, and should not be treated as such, but ensuring that these fundamentals are covered will greatly aid the consumer in purchasing a secure IoT product.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Category&lt;br /&gt;
! IoT Security Consideration&lt;br /&gt;
|- &lt;br /&gt;
| '''I1: Insecure Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has the option to use HTTPS, ensure it is enabled&lt;br /&gt;
* If your system has a two factor authentication option, ensure that it is enabled&lt;br /&gt;
* If your system has web application firewall option, ensure that it is enabled&lt;br /&gt;
* If your system has a local or cloud-based web application, ensure that you change the default password to a strong one and if possible change the default username as well&lt;br /&gt;
* If the system has account lockout functionality, ensure that it is enabled&lt;br /&gt;
* Consider employing network segmentation technologies such as firewalls to isolate IoT systems from critical IT systems&lt;br /&gt;
|- &lt;br /&gt;
| '''I2: Insufficient Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has a local or cloud-based web application, ensure that you change the default password to a strong one and if possible change the default username as well&lt;br /&gt;
* If the system has account lockout functionality, ensure that it is enabled&lt;br /&gt;
* If the system has the option to require strong passwords, ensure that is enabled&lt;br /&gt;
* If the system has the option to require new passwords after 90 days for example, ensure that is enabled&lt;br /&gt;
* If your system has a two factor authentication option, ensure that it is enabled&lt;br /&gt;
* If your system has the option to set user privileges, consider setting user privileges to the minimal needed for operation&lt;br /&gt;
* Consider employing network segmentation technologies such as firewalls to isolate IoT systems from critical IT systems&lt;br /&gt;
|- &lt;br /&gt;
| '''I3: Insecure Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has a firewall option available, enable it and ensure that it can only be accessed from your client systems&lt;br /&gt;
* Consider employing network segmentation technologies such as firewalls to isolate IoT systems from critical IT systems&lt;br /&gt;
|- &lt;br /&gt;
| '''I4: Lack of Transport Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has the option to use HTTPS, ensure it is enabled&lt;br /&gt;
|- &lt;br /&gt;
| '''I5: Privacy Concerns'''&lt;br /&gt;
|&lt;br /&gt;
* Do not enter sensitive information into the system that is not absolutely required, e.g. address, DOB, CC, etc.&lt;br /&gt;
* Deny data collection if it appears to be beyond what is needed for proper operation of the device (If provided the choice)&lt;br /&gt;
|- &lt;br /&gt;
| '''I6: Insecure Cloud Interface'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has the option to use HTTPS, ensure it is enabled&lt;br /&gt;
* If your system has a two factor authentication option, ensure that it is enabled&lt;br /&gt;
* If your system has web application firewall option, ensure that it is enabled&lt;br /&gt;
* If your system has a local or cloud-based web application, ensure that you change the default password to a strong one and if possible change the default username as well&lt;br /&gt;
* If the system has account lockout functionality, ensure that it is enabled&lt;br /&gt;
* If the system has the option to require strong passwords, ensure that is enabled&lt;br /&gt;
* If the system has the option to require new passwords after 90 days for example, ensure that is enabled&lt;br /&gt;
|- &lt;br /&gt;
| '''I7: Insecure Mobile Interface'''&lt;br /&gt;
|&lt;br /&gt;
* If the mobile application has the option to require a PIN or password, consider using it for extra security (on client and server)&lt;br /&gt;
* If the mobile application has the option to use two factory authentication such as Apple's Touch ID, ensure it is enabled&lt;br /&gt;
* If the system has account lockout functionality, ensure that it is enabled&lt;br /&gt;
* If the system has the option to require strong passwords, ensure that is enabled&lt;br /&gt;
* If the system has the option to require new passwords after 90 days for example, ensure that is enabled&lt;br /&gt;
* Do not enter sensitive information into the mobile application that is not absolutely required, e.g. address, DOB, CC, etc.&lt;br /&gt;
|- &lt;br /&gt;
| '''I8: Insufficient Security Configurability'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has the option, enable any logging functionality for security-related events&lt;br /&gt;
* If your system has the option, enable any alert and notification functionality for security-related events&lt;br /&gt;
* If your system has security options for passwords, ensure they are enabled for strong passwords&lt;br /&gt;
* If your system has security options for encryption, ensure they are set for an accepted standard such as AES-256&lt;br /&gt;
|- &lt;br /&gt;
| '''I9: Insecure Software/Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has the option to verify updates, ensure it is enabled&lt;br /&gt;
* If your system has the option to download updates securely, ensure it is enabled&lt;br /&gt;
* If your system has the ability to schedule updates on a regular cadence, consider enabling it&lt;br /&gt;
|- &lt;br /&gt;
| '''I10: Poor Physical Security'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has the ability to limit administrative capabilities possible by connecting locally, consider enabling that feature&lt;br /&gt;
* Disable any unused physical ports through the administrative interface&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===General Recommendations===&lt;br /&gt;
&lt;br /&gt;
If you are looking to purchase a device or system, consider the following recommendations:&lt;br /&gt;
* Include security in feature considerations when evaluating a product&lt;br /&gt;
* Place Internet of Things devices on a separate network if possible using a firewall&lt;br /&gt;
&lt;br /&gt;
[ NOTE: Given the fact that each deployment and every environment is different, it is important to weigh the pros and cons of implementing the advice above before taking each step. ]&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=IoT_Testing_Guides&amp;diff=216878</id>
		<title>IoT Testing Guides</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=IoT_Testing_Guides&amp;diff=216878"/>
				<updated>2016-05-14T19:37:25Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project Back To The Internet of Things Project]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tester IoT Security Guidance ==&lt;br /&gt;
&lt;br /&gt;
(DRAFT)&lt;br /&gt;
&lt;br /&gt;
The goal of this page is to help testers assess IoT devices and applications in the Internet of Things space. The guidance below is at a basic level, giving testers of devices and applications a basic set of guidelines to consider from their perspective. This is not a comprehensive list of considerations, and should not be treated as such, but ensuring that these fundamentals are covered will greatly improve the security of any IoT product.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Category&lt;br /&gt;
! IoT Security Consideration&lt;br /&gt;
|- &lt;br /&gt;
| '''I1: Insecure Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Assess any web interface to determine if weak passwords are allowed&lt;br /&gt;
* Assess the account lockout mechanism&lt;br /&gt;
* Assess the web interface for XSS, SQLi and CSRF vulnerabilities and other web application vulnerabilities&lt;br /&gt;
* Assess the use of HTTPS to protect transmitted information&lt;br /&gt;
* Assess the ability to change the username and password&lt;br /&gt;
* Determine if web application firewalls are used to protect web interfaces&lt;br /&gt;
|- &lt;br /&gt;
| '''I2: Insufficient Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Assess the solution for the use of strong passwords where authentication is needed&lt;br /&gt;
* Assess the solution for multi-user environments and ensure it includes functionality for role separation&lt;br /&gt;
* Assess the solution for Implementation two-factor authentication where possible&lt;br /&gt;
* Assess password recovery mechanisms&lt;br /&gt;
* Assess the solution for the option to require strong passwords&lt;br /&gt;
* Assess the solution for the option to force password expiration after a specific period&lt;br /&gt;
* Assess the solution for the option to change the default username and password&lt;br /&gt;
|- &lt;br /&gt;
| '''I3: Insecure Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Assess the solution to ensure network services don't respond poorly to buffer overflow, fuzzing or denial of service attacks&lt;br /&gt;
* Assess the solution to ensure test ports are are not present&lt;br /&gt;
|- &lt;br /&gt;
| '''I4: Lack of Transport Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Assess the solution to determine the use of encrypted communication between devices and between devices and the internet&lt;br /&gt;
* Assess the solution to determine if accepted encryption practices are used and if proprietary protocols are avoided&lt;br /&gt;
* Assess the solution to determine if a firewall option available is available&lt;br /&gt;
|- &lt;br /&gt;
| '''I5: Privacy Concerns'''&lt;br /&gt;
|&lt;br /&gt;
* Assess the solution to determine the amount of personal information collected&lt;br /&gt;
* Assess the solution to determine if collected personal data is properly protected using encryption at rest and in transit&lt;br /&gt;
* Assess the solution to determine if Ensuring data is de-identified or anonymized&lt;br /&gt;
* Assess the solution to ensure end-users are given a choice for data collected beyond what is needed for proper operation of the device&lt;br /&gt;
|- &lt;br /&gt;
| '''I6: Insecure Cloud Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Assess the cloud interfaces for security vulnerabilities (e.g. API interfaces and cloud-based web interfaces)&lt;br /&gt;
* Assess the cloud-based web interface to ensure it disallows weak passwords&lt;br /&gt;
* Assess the cloud-based web interface to ensure it includes an account lockout mechanism&lt;br /&gt;
* Assess the cloud-based web interface to determine if two-factor authentication is used&lt;br /&gt;
* Assess any cloud interfaces for XSS, SQLi and CSRF vulnerabilities and other vulnerabilities&lt;br /&gt;
* Assess all cloud interfaces to ensure transport encryption is used&lt;br /&gt;
* Assess the cloud interfaces to determine if the option to require strong passwords is available&lt;br /&gt;
* Assess the cloud interfaces to determine if the option to force password expiration after a specific period is available&lt;br /&gt;
* Assess the cloud interfaces to determine if the option to change the default username and password is available&lt;br /&gt;
|- &lt;br /&gt;
| '''I7: Insecure Mobile Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Assess the mobile interface to ensure it disallows weak passwords&lt;br /&gt;
* Assess the mobile interface to ensure it includes an account lockout mechanism&lt;br /&gt;
* Assess the mobile interface to determine if it Implements two-factor authentication (e.g Apple's Touch ID)&lt;br /&gt;
* Assess the mobile interface to determine if it uses transport encryption&lt;br /&gt;
* Assess the mobile interface to determine if the option to require strong passwords is available&lt;br /&gt;
* Assess the mobile interface to determine if the option to force password expiration after a specific period is available&lt;br /&gt;
* Assess the mobile interface to determine if the option to change the default username and password is available&lt;br /&gt;
* Assess the mobile interface to determine the amount of personal information collected&lt;br /&gt;
|- &lt;br /&gt;
| '''I8: Insufficient Security Configurability'''&lt;br /&gt;
|&lt;br /&gt;
* Assess the solution to determine if password security options (e.g. Enabling 20 character passwords or enabling two-factor authentication) are available&lt;br /&gt;
* Assess the solution to determine if encryption options (e.g. Enabling AES-256 where AES-128 is the default setting) are available&lt;br /&gt;
* Assess the solution to determine if logging for security events is available&lt;br /&gt;
* Assess the solution to determine if alerts and notifications to the user for security events are available&lt;br /&gt;
|- &lt;br /&gt;
| '''I9: Insecure Software/Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Assess the device to ensure it includes update capability and can be updated quickly when vulnerabilities are discovered&lt;br /&gt;
* Assess the device to ensure it uses encrypted update files and that the files are transmitted using encryption&lt;br /&gt;
* Assess the device to ensure is uses signed files and then validates that file before installation&lt;br /&gt;
&lt;br /&gt;
|- &lt;br /&gt;
| '''I10: Poor Physical Security'''&lt;br /&gt;
|&lt;br /&gt;
* Assess the device to ensure it utilizes a minimal number of physical external ports (e.g. USB ports) on the device&lt;br /&gt;
* Assess the device to determine if it can be accessed via unintended methods such as through an unnecessary USB port&lt;br /&gt;
* Assess the device to determine if it allows for disabling of unused physical ports such as USB&lt;br /&gt;
* Assess the device to determine if it includes the ability to limit administrative capabilities to a local interface only&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===General Recommendations===&lt;br /&gt;
&lt;br /&gt;
Consider the following recommendations for all user interfaces (local device, cloud-based and mobile):&lt;br /&gt;
* Avoid potential Account Harvesting issues by:&lt;br /&gt;
** Ensuring valid user accounts can't be identified by interface error messages&lt;br /&gt;
** Ensuring strong passwords are required by users&lt;br /&gt;
** Implementing account lockout after 3 - 5 failed login attempts&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=216877</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=216877"/>
				<updated>2016-05-14T19:36:23Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* IoT Attack Surface Areas&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top IoT Vulnerabilities]&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Major Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added two sub-projects; ICS/SCADA and Firmware Analysis&lt;br /&gt;
* Daniel Miessler gave his IoT talk at DEFCON 23&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Access Control'''&lt;br /&gt;
|&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Cleartext usernames&lt;br /&gt;
* Cleartext passwords&lt;br /&gt;
* Third-party credentials&lt;br /&gt;
* Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Encryption (Symmetric, Asymmetric)&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, Zigbee, Bluetooth)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Top 10 IoT Vulnerabilities (2014) =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Top 10 IoT Vulnerabilities (2014) Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 IoT Vulnerabilities are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''I1'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I1 Insecure Web Interface | Insecure Web Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I2'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I2 Insufficient Authentication/Authorization | Insufficient Authentication/Authorization]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I3'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I3 Insecure Network Services | Insecure Network Services]]&lt;br /&gt;
|-&lt;br /&gt;
| '''I4'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I4 Lack of Transport Encryption | Lack of Transport Encryption/Integrity Verification]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I5'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I5 Privacy Concerns | Privacy Concerns]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I6'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I6 Insecure Cloud Interface | Insecure Cloud Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I7'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I7 Insecure Mobile Interface | Insecure Mobile Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I8'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I8 Insufficient Security Configurability | Insufficient Security Configurability]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I9'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I9 Insecure Software/Firmware | Insecure Software/Firmware]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I10'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I10 Poor Physical Security | Poor Physical Security]]&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Top 10 IoT Vulnerabiltiies Project? ==&lt;br /&gt;
&lt;br /&gt;
The Top 10 IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the top 10 internet of things vulnerabilities&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-  &lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= IoT Security Guideline =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Guideline Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Guideline provides follows :&lt;br /&gt;
&lt;br /&gt;
====== 1. Secure IoT Software Development Guideline ======&lt;br /&gt;
----&lt;br /&gt;
* Software(or SDK) Running on Device&lt;br /&gt;
* Software Running on IoT Cloud Platform(server-side)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====== 2. Secure IoT Hardware Development Guideline ======&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====== 3. Privacy Guideline for IoT Service/System ======&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Guideline Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Guideline Project provides:&lt;br /&gt;
&lt;br /&gt;
* Software Development Guideline&lt;br /&gt;
* Hardware Development Guideline&lt;br /&gt;
* Privacy Guideline&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Yunsoul Yunsoul]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Top_IoT_Vulnerabilities&amp;diff=216876</id>
		<title>Top IoT Vulnerabilities</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Top_IoT_Vulnerabilities&amp;diff=216876"/>
				<updated>2016-05-14T19:33:53Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project Back To Internet of Things Project]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The top IoT vulnerabilities (DRAFT) are as follow:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=216875</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=216875"/>
				<updated>2016-05-14T19:29:24Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Attack_Surface_Areas IoT Attack Surface Areas]&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top IoT Vulnerabilities]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=Firmware_Analysis Firmware Analysis]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=ICS_2FSCADA ICS/SCADA Software Weaknesses]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=Community Community Information]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Major Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added two sub-projects; ICS/SCADA and Firmware Analysis&lt;br /&gt;
* Daniel Miessler gave his IoT talk at DEFCON 23&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Access Control'''&lt;br /&gt;
|&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Cleartext usernames&lt;br /&gt;
* Cleartext passwords&lt;br /&gt;
* Third-party credentials&lt;br /&gt;
* Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Encryption (Symmetric, Asymmetric)&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, Zigbee, Bluetooth)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Top 10 IoT Vulnerabilities (2014) =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Top 10 IoT Vulnerabilities (2014) Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 IoT Vulnerabilities are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''I1'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I1 Insecure Web Interface | Insecure Web Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I2'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I2 Insufficient Authentication/Authorization | Insufficient Authentication/Authorization]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I3'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I3 Insecure Network Services | Insecure Network Services]]&lt;br /&gt;
|-&lt;br /&gt;
| '''I4'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I4 Lack of Transport Encryption | Lack of Transport Encryption/Integrity Verification]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I5'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I5 Privacy Concerns | Privacy Concerns]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I6'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I6 Insecure Cloud Interface | Insecure Cloud Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I7'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I7 Insecure Mobile Interface | Insecure Mobile Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I8'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I8 Insufficient Security Configurability | Insufficient Security Configurability]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I9'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I9 Insecure Software/Firmware | Insecure Software/Firmware]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I10'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I10 Poor Physical Security | Poor Physical Security]]&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Top 10 IoT Vulnerabiltiies Project? ==&lt;br /&gt;
&lt;br /&gt;
The Top 10 IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the top 10 internet of things vulnerabilities&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-  &lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= IoT Security Guideline =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Guideline Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Guideline provides follows :&lt;br /&gt;
&lt;br /&gt;
====== 1. Secure IoT Software Development Guideline ======&lt;br /&gt;
----&lt;br /&gt;
* Software(or SDK) Running on Device&lt;br /&gt;
* Software Running on IoT Cloud Platform(server-side)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====== 2. Secure IoT Hardware Development Guideline ======&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====== 3. Privacy Guideline for IoT Service/System ======&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Guideline Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Guideline Project provides:&lt;br /&gt;
&lt;br /&gt;
* Software Development Guideline&lt;br /&gt;
* Hardware Development Guideline&lt;br /&gt;
* Privacy Guideline&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Yunsoul Yunsoul]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=211751</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=211751"/>
				<updated>2016-03-24T16:48:36Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides:&lt;br /&gt;
&lt;br /&gt;
* IoT Attack Surface Areas&lt;br /&gt;
* IoT Testing Guides&lt;br /&gt;
* Top 10 IoT Vulnerabilities&lt;br /&gt;
* IoT Security Guidance&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* Developer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Major Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added two sub-projects; ICS/SCADA and Firmware Analysis&lt;br /&gt;
* Daniel Miessler gave his IoT talk at DEFCON 23&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Access Control'''&lt;br /&gt;
|&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Cleartext usernames&lt;br /&gt;
* Cleartext passwords&lt;br /&gt;
* Third-party credentials&lt;br /&gt;
* Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Encryption (Symmetric, Asymmetric)&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, Zigbee, Bluetooth)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top IoT Vulnerabilities]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Top 10 IoT Vulnerabilities (2014) =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Top 10 IoT Vulnerabilities (2014) Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 IoT Vulnerabilties are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''I1'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I1 Insecure Web Interface | Insecure Web Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I2'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I2 Insufficient Authentication/Authorization | Insufficient Authentication/Authorization]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I3'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I3 Insecure Network Services | Insecure Network Services]]&lt;br /&gt;
|-&lt;br /&gt;
| '''I4'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I4 Lack of Transport Encryption | Lack of Transport Encryption/Integrity Verification]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I5'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I5 Privacy Concerns | Privacy Concerns]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I6'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I6 Insecure Cloud Interface | Insecure Cloud Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I7'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I7 Insecure Mobile Interface | Insecure Mobile Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I8'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I8 Insufficient Security Configurability | Insufficient Security Configurability]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I9'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I9 Insecure Software/Firmware | Insecure Software/Firmware]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I10'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I10 Poor Physical Security | Poor Physical Security]]&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Top 10 IoT Vulnerabiltiies Project? ==&lt;br /&gt;
&lt;br /&gt;
The Top 10 IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the top 10 internet of things vulnerabilities&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-  &lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= IoT Security Guideline =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Guideline Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Guideline provides follows :&lt;br /&gt;
&lt;br /&gt;
====== 1. Secure IoT Software Development Guideline ======&lt;br /&gt;
----&lt;br /&gt;
* Software(or SDK) Running on Device&lt;br /&gt;
* Software Running on IoT Cloud Platform(server-side)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====== 2. Secure IoT Hardware Development Guideline ======&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====== 3. Privacy Guideline for IoT Service/System ======&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Guideline Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Guideline Project provides:&lt;br /&gt;
&lt;br /&gt;
* Software Development Guideline&lt;br /&gt;
* Hardware Development Guideline&lt;br /&gt;
* Privacy Guideline&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Yunsoul Yunsoul]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=210754</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=210754"/>
				<updated>2016-03-09T16:43:20Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: /* News and Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides:&lt;br /&gt;
&lt;br /&gt;
* IoT Attack Surface Areas&lt;br /&gt;
* IoT Testing Guides&lt;br /&gt;
* Top 10 IoT Vulnerabilities&lt;br /&gt;
* IoT Security Guidance&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* Developer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Major Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added two sub-projects; ICS/SCADA and Firmware Analysis&lt;br /&gt;
* Daniel Miessler gave his IoT talk at DEFCON 23&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Access Control'''&lt;br /&gt;
|&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Cleartext usernames&lt;br /&gt;
* Cleartext passwords&lt;br /&gt;
* Third-party credentials&lt;br /&gt;
* Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Encryption (Symmetric, Asymmetric)&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, Zigbee, Bluetooth)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top IoT Vulnerabilities]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Top 10 IoT Vulnerabilities (2014) =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Top 10 IoT Vulnerabilities (2014) Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 IoT Vulnerabilties are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''I1'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I1 Insecure Web Interface | Insecure Web Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I2'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I2 Insufficient Authentication/Authorization | Insufficient Authentication/Authorization]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I3'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I3 Insecure Network Services | Insecure Network Services]]&lt;br /&gt;
|-&lt;br /&gt;
| '''I4'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I4 Lack of Transport Encryption | Lack of Transport Encryption/Integrity Verification]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I5'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I5 Privacy Concerns | Privacy Concerns]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I6'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I6 Insecure Cloud Interface | Insecure Cloud Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I7'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I7 Insecure Mobile Interface | Insecure Mobile Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I8'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I8 Insufficient Security Configurability | Insufficient Security Configurability]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I9'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I9 Insecure Software/Firmware | Insecure Software/Firmware]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I10'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I10 Poor Physical Security | Poor Physical Security]]&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Top 10 IoT Vulnerabiltiies Project? ==&lt;br /&gt;
&lt;br /&gt;
The Top 10 IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the top 10 internet of things vulnerabilities&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
|-  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= IoT Security Guideline =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Guideline Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Guideline provides follows :&lt;br /&gt;
&lt;br /&gt;
====== 1. Secure IoT Software Development Guideline ======&lt;br /&gt;
----&lt;br /&gt;
* Software(or SDK) Running on Device&lt;br /&gt;
* Software Running on IoT Cloud Platform(server-side)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====== 2. Secure IoT Hardware Development Guideline ======&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====== 3. Privacy Guideline for IoT Service/System ======&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Guideline Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Guideline Project provides:&lt;br /&gt;
&lt;br /&gt;
* Software Development Guideline&lt;br /&gt;
* Hardware Development Guideline&lt;br /&gt;
* Privacy Guideline&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Yunsoul Yunsoul]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=209049</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=209049"/>
				<updated>2016-02-16T19:02:27Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides:&lt;br /&gt;
&lt;br /&gt;
* IoT Attack Surface Areas&lt;br /&gt;
* IoT Testing Guides&lt;br /&gt;
* Top 10 IoT Vulnerabilities&lt;br /&gt;
* IoT Security Guidance&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* Developer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Major Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Daniel Miessler gave his IoT talk at DEFCON 23&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack. &lt;br /&gt;
* IoT devices averaged 25 vulnerabilities per    product, indicating expanding attack surface for adversaries&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Access Control'''&lt;br /&gt;
|&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Cleartext usernames&lt;br /&gt;
* Cleartext passwords&lt;br /&gt;
* Third-party credentials&lt;br /&gt;
* Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Encryption (Symmetric, Asymmetric)&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, Zigbee, Bluetooth)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top IoT Vulnerabilities]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Top 10 IoT Vulnerabilities (2014) =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Top 10 IoT Vulnerabilities (2014) Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 IoT Vulnerabilties are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''I1'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I1 Insecure Web Interface | Insecure Web Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I2'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I2 Insufficient Authentication/Authorization | Insufficient Authentication/Authorization]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I3'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I3 Insecure Network Services | Insecure Network Services]]&lt;br /&gt;
|-&lt;br /&gt;
| '''I4'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I4 Lack of Transport Encryption | Lack of Transport Encryption/Integrity Verification]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I5'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I5 Privacy Concerns | Privacy Concerns]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I6'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I6 Insecure Cloud Interface | Insecure Cloud Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I7'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I7 Insecure Mobile Interface | Insecure Mobile Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I8'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I8 Insufficient Security Configurability | Insufficient Security Configurability]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I9'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I9 Insecure Software/Firmware | Insecure Software/Firmware]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I10'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I10 Poor Physical Security | Poor Physical Security]]&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Top 10 IoT Vulnerabiltiies Project? ==&lt;br /&gt;
&lt;br /&gt;
The Top 10 IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the top 10 internet of things vulnerabilities&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
|-  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=208613</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=208613"/>
				<updated>2016-02-12T17:45:39Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides:&lt;br /&gt;
&lt;br /&gt;
* IoT Attack Surface Areas&lt;br /&gt;
* IoT Testing Guides&lt;br /&gt;
* Top 10 IoT Vulnerabilities&lt;br /&gt;
* IoT Security Guidance&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* Developer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Major Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Daniel Miessler gave his IoT talk at DEFCON 23&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack. &lt;br /&gt;
* IoT devices averaged 25 vulnerabilities per    product, indicating expanding attack surface for adversaries&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Access Control'''&lt;br /&gt;
|&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Cleartext usernames&lt;br /&gt;
* Cleartext passwords&lt;br /&gt;
* Third-party credentials&lt;br /&gt;
* Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Encryption (Symmetric, Asymmetric)&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, Zigbee, Bluetooth)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top IoT Vulnerabilities]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Top 10 IoT Vulnerabilities (2014) =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Top 10 IoT Vulnerabilities (2014) Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 IoT Vulnerabilties are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''I1'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I1 Insecure Web Interface | Insecure Web Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I2'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I2 Insufficient Authentication/Authorization | Insufficient Authentication/Authorization]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I3'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I3 Insecure Network Services | Insecure Network Services]]&lt;br /&gt;
|-&lt;br /&gt;
| '''I4'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I4 Lack of Transport Encryption | Lack of Transport Encryption/Integrity Verification]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I5'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I5 Privacy Concerns | Privacy Concerns]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I6'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I6 Insecure Cloud Interface | Insecure Cloud Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I7'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I7 Insecure Mobile Interface | Insecure Mobile Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I8'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I8 Insufficient Security Configurability | Insufficient Security Configurability]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I9'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I9 Insecure Software/Firmware | Insecure Software/Firmware]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I10'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I10 Poor Physical Security | Poor Physical Security]]&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Top 10 IoT Vulnerabiltiies Project? ==&lt;br /&gt;
&lt;br /&gt;
The Top 10 IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the top 10 internet of things vulnerabilities&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
|-  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=IoT_Firmware_Analysis&amp;diff=208601</id>
		<title>IoT Firmware Analysis</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=IoT_Firmware_Analysis&amp;diff=208601"/>
				<updated>2016-02-12T16:29:13Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=Firmware_Analysis Back To The Firmware Analysis Project]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Obtain and Analyze Firmware ==&lt;br /&gt;
&lt;br /&gt;
=== Obtain Firmware ===&lt;br /&gt;
* From vendor download site&lt;br /&gt;
* Capture during device update&lt;br /&gt;
* Extract directly from hardware&lt;br /&gt;
&lt;br /&gt;
=== Analyze Firmware File ===&lt;br /&gt;
* Run the &amp;quot;file&amp;quot; command on the *.bin file&lt;br /&gt;
  * We are looking for File to return as &amp;quot;data&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Verify the MD5 signature if you have it&lt;br /&gt;
 * Run the &amp;quot;cat&amp;quot; command on the *.md5 file&lt;br /&gt;
 * Run the &amp;quot;md5sum&amp;quot; command on the *.bin file&lt;br /&gt;
&lt;br /&gt;
* Run &amp;quot;strings&amp;quot; against *.bin file&lt;br /&gt;
 * ex. &amp;quot;strings -n 10 xyz.bin &amp;gt; strings.out&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;less strings.out&amp;quot;&lt;br /&gt;
 * Running strings can give deeper insight into the file&lt;br /&gt;
&lt;br /&gt;
* Run &amp;quot;hexdump&amp;quot; against *.bin file&lt;br /&gt;
 * ex. &amp;quot;hexdump -C -n 512 xyz.bin &amp;gt; hexdump.out&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;cat hexdump.out&amp;quot;&lt;br /&gt;
 * Running hexdump can help identify the type of firmware build&lt;br /&gt;
&lt;br /&gt;
* &amp;quot;binwalk&amp;quot; will be one of the primary tools used for analyzing, reverse engineering and extracting data from the firmware image&lt;br /&gt;
 * ex. &amp;quot;binwalk xyz.bin&amp;quot;&lt;br /&gt;
 * We are looking for binwalk to identify the type of file system in use, ex. squashfs filesystem&lt;br /&gt;
&lt;br /&gt;
=== Extracting the File System from the Firmware File ===&lt;br /&gt;
* Run binwalk against the firmware file&lt;br /&gt;
 * ex. &amp;quot;binwalk xyz.bin&amp;quot;&lt;br /&gt;
 * Again, we are looking for binwalk to hopefully identify the file system&lt;br /&gt;
&lt;br /&gt;
* Extracting the filesystme using &amp;quot;dd&amp;quot;&lt;br /&gt;
 * Assuming binwalk has identified a valid file system like squashfs for example, we can use &amp;quot;dd&amp;quot; as one way to extract the file system&lt;br /&gt;
 * ex. &amp;quot;dd if=xyz.bin bs=1 skip=922460 count=2522318 of=xyz.squashfs&amp;quot;&lt;br /&gt;
 * Note: skip and count values will vary depending on your specific bin file&lt;br /&gt;
 &lt;br /&gt;
* Following extraction of the filesystem assuming it is squashfs, we can expand the contents by running &amp;quot;sasquatch&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;sasquatch xys.squashfs&amp;quot;&lt;br /&gt;
 * &amp;quot;cd&amp;quot; into &amp;quot;squash-root&amp;quot; and have a look around for interesting things&lt;br /&gt;
 * Some examples include:&lt;br /&gt;
 * /etc/ssl&lt;br /&gt;
 * /etc/passwd&lt;br /&gt;
 * /etc/shadow&lt;br /&gt;
 * .ssh/authorized_keys&lt;br /&gt;
&lt;br /&gt;
=== Using the Firmware Modification Kit ===&lt;br /&gt;
* The firmware modification kit can be used to attempt extracting a file system that is is not the traditional squashfs file system&lt;br /&gt;
* Typically if you run hexedit on the firmware file you will see &amp;quot;sqsh&amp;quot; at the beginning of the file, however if you see something like &amp;quot;shsq&amp;quot; it's probable that the file system has been modified.&lt;br /&gt;
* After we dd the firmware file to extract the squashfs file system, we can attempt to run &amp;quot;unsquashfs&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;unsquashfs xyz.squashfs&lt;br /&gt;
 * If that does not work, we can try &amp;quot;unsquashfs_all&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;unsquashfs_all.sh xyz.bin&amp;quot;&lt;br /&gt;
 * Assuming that works, you can view the file system at &amp;quot;fmk/rootfs&amp;quot;&lt;br /&gt;
 * You can also simply run the extract-firmware.sh script under the fmk directory&lt;br /&gt;
&lt;br /&gt;
=== Extracting and Running Binaries ===&lt;br /&gt;
* We might want to see how identified binaries behave without running them on the device itself&lt;br /&gt;
* One way to identify potentially interesting binaries is by examining the startup script from the device which we can discover by extracting the file system&lt;br /&gt;
* QEMU emulation is also another way to examine binaries&lt;br /&gt;
&lt;br /&gt;
=== Extracting a jffs2 file system ===&lt;br /&gt;
* Use the &amp;quot;unjffs2&amp;quot; batch file which is part of the firmware modification kit. &amp;quot;/firmware-mod-kit/src/jffs2/unjffs2&amp;quot;&lt;br /&gt;
* You can also extract the jffs file using binwalk assuming Jefferson is installed (https://github.com/sviehb/jefferson)&lt;br /&gt;
&lt;br /&gt;
=== Extracting from a CPIO archive file ===&lt;br /&gt;
* cpio -ivd --no-absolute-filenames -F {filename}&lt;br /&gt;
&lt;br /&gt;
=== Extracting from a UBI file system ===&lt;br /&gt;
* Ensure Python Setuptools is installed for UBI Reader to install properly (sudo apt-get install python-setuptools)&lt;br /&gt;
* Ensure UBI Reader is installed (https://github.com/jrspruitt/ubi_reader)&lt;br /&gt;
* Run binwalk -e {filename}&lt;br /&gt;
&lt;br /&gt;
=== Mounting a .ext2 file ===&lt;br /&gt;
* Create a mount directory (e.g. mkdir rootfs)&lt;br /&gt;
* sudo mount -t ext2 {filename} rootfs&lt;br /&gt;
&lt;br /&gt;
=== Things to check for once the file system is mounted or extracted ===&lt;br /&gt;
* &amp;quot;etc/passwd&amp;quot; and &amp;quot;etc/shadow&amp;quot;&lt;br /&gt;
* &amp;quot;etc/ssl&amp;quot;&lt;br /&gt;
* grep -rnw '/path/to/somewhere/' -e &amp;quot;pattern&amp;quot; like password, admin, root, etc.&lt;br /&gt;
* find . -name '*.conf' and other file types like *.pem, *.crt, *.cfg, .sh, .bin, etc.&lt;br /&gt;
* You can also run the Firmwalker script to search for these items in the extracted file system (https://github.com/craigz28/firmwalker)&lt;br /&gt;
&lt;br /&gt;
=== Dynamic testing of a web admin interface without the device ===&lt;br /&gt;
* See the example video (https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/)&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=208548</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=208548"/>
				<updated>2016-02-12T06:24:44Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides:&lt;br /&gt;
&lt;br /&gt;
* IoT Attack Surface Areas&lt;br /&gt;
* IoT Testing Guides&lt;br /&gt;
* Top 10 IoT Vulnerabilities&lt;br /&gt;
* IoT Security Guidance&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* Developer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Major Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Daniel Miessler gave his IoT talk at DEFCON 23&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack. &lt;br /&gt;
* IoT devices averaged 25 vulnerabilities per    product, indicating expanding attack surface for adversaries&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Access Control'''&lt;br /&gt;
|&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Cleartext usernames&lt;br /&gt;
* Cleartext passwords&lt;br /&gt;
* Third-party credentials&lt;br /&gt;
* Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Encryption (Symmetric, Asymmetric)&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, Zigbee, Bluetooth)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top IoT Vulnerabilities]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Top 10 IoT Vulnerabilities (2014) =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Top 10 IoT Vulnerabilities (2014) Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 IoT Vulnerabilties are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''I1'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I1 Insecure Web Interface | Insecure Web Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I2'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I2 Insufficient Authentication/Authorization | Insufficient Authentication/Authorization]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I3'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I3 Insecure Network Services | Insecure Network Services]]&lt;br /&gt;
|-&lt;br /&gt;
| '''I4'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I4 Lack of Transport Encryption | Lack of Transport Encryption/Integrity Verification]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I5'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I5 Privacy Concerns | Privacy Concerns]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I6'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I6 Insecure Cloud Interface | Insecure Cloud Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I7'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I7 Insecure Mobile Interface | Insecure Mobile Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I8'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I8 Insufficient Security Configurability | Insufficient Security Configurability]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I9'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I9 Insecure Software/Firmware | Insecure Software/Firmware]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I10'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I10 Poor Physical Security | Poor Physical Security]]&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Top 10 IoT Vulnerabiltiies Project? ==&lt;br /&gt;
&lt;br /&gt;
The Top 10 IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the top 10 internet of things vulnerabilities&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
|-  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/tag/podcasts/ IoT Inc]&lt;br /&gt;
* [https://soundcloud.com/craig-smith-381 IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=IoT_Firmware_Analysis&amp;diff=208490</id>
		<title>IoT Firmware Analysis</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=IoT_Firmware_Analysis&amp;diff=208490"/>
				<updated>2016-02-10T23:17:47Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=Firmware_Analysis Back To The Firmware Analysis Project]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Obtain and Analyze Firmware ==&lt;br /&gt;
&lt;br /&gt;
=== Obtain Firmware ===&lt;br /&gt;
* From vendor download site&lt;br /&gt;
* Capture during device update&lt;br /&gt;
* Extract directly from hardware&lt;br /&gt;
&lt;br /&gt;
=== Analyze Firmware File ===&lt;br /&gt;
* Run the &amp;quot;file&amp;quot; command on the *.bin file&lt;br /&gt;
  * We are looking for File to return as &amp;quot;data&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Verify the MD5 signature if you have it&lt;br /&gt;
 * Run the &amp;quot;cat&amp;quot; command on the *.md5 file&lt;br /&gt;
 * Run the &amp;quot;md5sum&amp;quot; command on the *.bin file&lt;br /&gt;
&lt;br /&gt;
* Run &amp;quot;strings&amp;quot; against *.bin file&lt;br /&gt;
 * ex. &amp;quot;strings -n 10 xyz.bin &amp;gt; strings.out&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;less strings.out&amp;quot;&lt;br /&gt;
 * Running strings can give deeper insight into the file&lt;br /&gt;
&lt;br /&gt;
* Run &amp;quot;hexdump&amp;quot; against *.bin file&lt;br /&gt;
 * ex. &amp;quot;hexdump -C -n 512 xyz.bin &amp;gt; hexdump.out&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;cat hexdump.out&amp;quot;&lt;br /&gt;
 * Running hexdump can help identify the type of firmware build&lt;br /&gt;
&lt;br /&gt;
* &amp;quot;binwalk&amp;quot; will be one of the primary tools used for analyzing, reverse engineering and extracting data from the firmware image&lt;br /&gt;
 * ex. &amp;quot;binwalk xyz.bin&amp;quot;&lt;br /&gt;
 * We are looking for binwalk to identify the type of file system in use, ex. squashfs filesystem&lt;br /&gt;
&lt;br /&gt;
=== Extracting the File System from the Firmware File ===&lt;br /&gt;
* Run binwalk against the firmware file&lt;br /&gt;
 * ex. &amp;quot;binwalk xyz.bin&amp;quot;&lt;br /&gt;
 * Again, we are looking for binwalk to hopefully identify the file system&lt;br /&gt;
&lt;br /&gt;
* Extracting the filesystme using &amp;quot;dd&amp;quot;&lt;br /&gt;
 * Assuming binwalk has identified a valid file system like squashfs for example, we can use &amp;quot;dd&amp;quot; as one way to extract the file system&lt;br /&gt;
 * ex. &amp;quot;dd if=xyz.bin bs=1 skip=922460 count=2522318 of=xyz.squashfs&amp;quot;&lt;br /&gt;
 * Note: skip and count values will vary depending on your specific bin file&lt;br /&gt;
 &lt;br /&gt;
* Following extraction of the filesystem assuming it is squashfs, we can expand the contents by running &amp;quot;sasquatch&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;sasquatch xys.squashfs&amp;quot;&lt;br /&gt;
 * &amp;quot;cd&amp;quot; into &amp;quot;squash-root&amp;quot; and have a look around for interesting things&lt;br /&gt;
 * Some examples include:&lt;br /&gt;
 * /etc/ssl&lt;br /&gt;
 * /etc/passwd&lt;br /&gt;
 * /etc/shadow&lt;br /&gt;
 * .ssh/authorized_keys&lt;br /&gt;
&lt;br /&gt;
=== Using the Firmware Modification Kit ===&lt;br /&gt;
* The firmware modification kit can be used to attempt extracting a file system that is is not the traditional squashfs file system&lt;br /&gt;
* Typically if you run hexedit on the firmware file you will see &amp;quot;sqsh&amp;quot; at the beginning of the file, however if you see something like &amp;quot;shsq&amp;quot; it's probable that the file system has been modified.&lt;br /&gt;
* After we dd the firmware file to extract the squashfs file system, we can attempt to run &amp;quot;unsquashfs&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;unsquashfs xyz.squashfs&lt;br /&gt;
 * If that does not work, we can try &amp;quot;unsquashfs_all&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;unsquashfs_all.sh xyz.bin&amp;quot;&lt;br /&gt;
 * Assuming that works, you can view the file system at &amp;quot;fmk/rootfs&amp;quot;&lt;br /&gt;
 * You can also simply run the extract-firmware.sh script under the fmk directory&lt;br /&gt;
&lt;br /&gt;
=== Extracting and Running Binaries ===&lt;br /&gt;
* We might want to see how identified binaries behave without running them on the device itself&lt;br /&gt;
* One way to identify potentially interesting binaries is by examining the startup script from the device which we can discover by extracting the file system&lt;br /&gt;
* QEMU emulation is also another way to examine binaries&lt;br /&gt;
&lt;br /&gt;
=== Extracting a jffs2 file system ===&lt;br /&gt;
* Use the &amp;quot;unjffs2&amp;quot; batch file which is part of the firmware modification kit. &amp;quot;/firmware-mod-kit/src/jffs2/unjffs2&amp;quot;&lt;br /&gt;
* You can also extract the jffs file using binwalk assuming Jefferson is installed (https://github.com/sviehb/jefferson)&lt;br /&gt;
&lt;br /&gt;
=== Extracting from a CPIO archive file ===&lt;br /&gt;
* cpio -ivd --no-absolute-filenames -F {filename}&lt;br /&gt;
&lt;br /&gt;
=== Extracting from a UBI file system ===&lt;br /&gt;
* Ensure Python Setuptools is installed for UBI Reader to install properly (sudo apt-get install python-setuptools)&lt;br /&gt;
* Ensure UBI Reader is installed (https://github.com/jrspruitt/ubi_reader)&lt;br /&gt;
* Run binwalk -e {filename}&lt;br /&gt;
&lt;br /&gt;
=== Mounting a .ext2 file ===&lt;br /&gt;
* Create a mount directory (e.g. mkdir rootfs)&lt;br /&gt;
* sudo mount -t ext2 {filename} rootfs&lt;br /&gt;
&lt;br /&gt;
=== Things to check for once the file system is mounted or extracted ===&lt;br /&gt;
* &amp;quot;etc/passwd&amp;quot; and &amp;quot;etc/shadow&amp;quot;&lt;br /&gt;
* &amp;quot;etc/ssl&amp;quot;&lt;br /&gt;
* grep -rnw '/path/to/somewhere/' -e &amp;quot;pattern&amp;quot; like password, admin, root, etc.&lt;br /&gt;
* find . -name '*.conf' and other file types like *.pem, *.crt, *.cfg, .sh, .bin, etc.&lt;br /&gt;
&lt;br /&gt;
=== Dynamic testing of a web admin interface without the device ===&lt;br /&gt;
* See the example video (https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/)&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=IoT_Firmware_Analysis&amp;diff=208488</id>
		<title>IoT Firmware Analysis</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=IoT_Firmware_Analysis&amp;diff=208488"/>
				<updated>2016-02-10T23:13:04Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=Firmware_Analysis Back To The Firmware Analysis Project]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Obtain and Analyze Firmware ==&lt;br /&gt;
&lt;br /&gt;
=== Obtain Firmware ===&lt;br /&gt;
* From vendor download site&lt;br /&gt;
* Capture during device update&lt;br /&gt;
* Extract directly from hardware&lt;br /&gt;
&lt;br /&gt;
=== Analyze Firmware File ===&lt;br /&gt;
* Run the &amp;quot;file&amp;quot; command on the *.bin file&lt;br /&gt;
  * We are looking for File to return as &amp;quot;data&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Verify the MD5 signature if you have it&lt;br /&gt;
 * Run the &amp;quot;cat&amp;quot; command on the *.md5 file&lt;br /&gt;
 * Run the &amp;quot;md5sum&amp;quot; command on the *.bin file&lt;br /&gt;
&lt;br /&gt;
* Run &amp;quot;strings&amp;quot; against *.bin file&lt;br /&gt;
 * ex. &amp;quot;strings -n 10 xyz.bin &amp;gt; strings.out&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;less strings.out&amp;quot;&lt;br /&gt;
 * Running strings can give deeper insight into the file&lt;br /&gt;
&lt;br /&gt;
* Run &amp;quot;hexdump&amp;quot; against *.bin file&lt;br /&gt;
 * ex. &amp;quot;hexdump -C -n 512 xyz.bin &amp;gt; hexdump.out&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;cat hexdump.out&amp;quot;&lt;br /&gt;
 * Running hexdump can help identify the type of firmware build&lt;br /&gt;
&lt;br /&gt;
* &amp;quot;binwalk&amp;quot; will be one of the primary tools used for analyzing, reverse engineering and extracting data from the firmware image&lt;br /&gt;
 * ex. &amp;quot;binwalk xyz.bin&amp;quot;&lt;br /&gt;
 * We are looking for binwalk to identify the type of file system in use, ex. squashfs filesystem&lt;br /&gt;
&lt;br /&gt;
=== Extracting the File System from the Firmware File ===&lt;br /&gt;
* Run binwalk against the firmware file&lt;br /&gt;
 * ex. &amp;quot;binwalk xyz.bin&amp;quot;&lt;br /&gt;
 * Again, we are looking for binwalk to hopefully identify the file system&lt;br /&gt;
&lt;br /&gt;
* Extracting the filesystme using &amp;quot;dd&amp;quot;&lt;br /&gt;
 * Assuming binwalk has identified a valid file system like squashfs for example, we can use &amp;quot;dd&amp;quot; as one way to extract the file system&lt;br /&gt;
 * ex. &amp;quot;dd if=xyz.bin bs=1 skip=922460 count=2522318 of=xyz.squashfs&amp;quot;&lt;br /&gt;
 * Note: skip and count values will vary depending on your specific bin file&lt;br /&gt;
 &lt;br /&gt;
* Following extraction of the filesystem assuming it is squashfs, we can expand the contents by running &amp;quot;sasquatch&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;sasquatch xys.squashfs&amp;quot;&lt;br /&gt;
 * &amp;quot;cd&amp;quot; into &amp;quot;squash-root&amp;quot; and have a look around for interesting things&lt;br /&gt;
 * Some examples include:&lt;br /&gt;
 * /etc/ssl&lt;br /&gt;
 * /etc/passwd&lt;br /&gt;
 * /etc/shadow&lt;br /&gt;
 * .ssh/authorized_keys&lt;br /&gt;
&lt;br /&gt;
=== Using the Firmware Modification Kit ===&lt;br /&gt;
* The firmware modification kit can be used to attempt extracting a file system that is is not the traditional squashfs file system&lt;br /&gt;
* Typically if you run hexedit on the firmware file you will see &amp;quot;sqsh&amp;quot; at the beginning of the file, however if you see something like &amp;quot;shsq&amp;quot; it's probable that the file system has been modified.&lt;br /&gt;
* After we dd the firmware file to extract the squashfs file system, we can attempt to run &amp;quot;unsquashfs&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;unsquashfs xyz.squashfs&lt;br /&gt;
 * If that does not work, we can try &amp;quot;unsquashfs_all&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;unsquashfs_all.sh xyz.bin&amp;quot;&lt;br /&gt;
 * Assuming that works, you can view the file system at &amp;quot;fmk/rootfs&amp;quot;&lt;br /&gt;
 * You can also simply run the extract-firmware.sh script under the fmk directory&lt;br /&gt;
&lt;br /&gt;
=== Extracting and Running Binaries ===&lt;br /&gt;
* We might want to see how identified binaries behave without running them on the device itself&lt;br /&gt;
* One way to identify potentially interesting binaries is by examining the startup script from the device which we can discover by extracting the file system&lt;br /&gt;
* QEMU emulation is also another way to examine binaries&lt;br /&gt;
&lt;br /&gt;
=== Extracting a jffs2 file system ===&lt;br /&gt;
* Use the &amp;quot;unjffs2&amp;quot; batch file which is part of the firmware modification kit. &amp;quot;/firmware-mod-kit/src/jffs2/unjffs2&amp;quot;&lt;br /&gt;
* You can also extract the jffs file using binwalk assuming Jefferson is installed (https://github.com/sviehb/jefferson)&lt;br /&gt;
&lt;br /&gt;
=== Extracting from a CPIO archive file ===&lt;br /&gt;
* cpio -ivd --no-absolute-filenames -F {filename}&lt;br /&gt;
&lt;br /&gt;
=== Extracting from a UBI file system ===&lt;br /&gt;
* Ensure Python Setuptools is installed for UBI Reader to install properly (sudo apt-get install python-setuptools)&lt;br /&gt;
* Ensure UBI Reader is installed (https://github.com/jrspruitt/ubi_reader)&lt;br /&gt;
* Run binwalk -e {filename}&lt;br /&gt;
&lt;br /&gt;
=== Mounting a .ext2 file ===&lt;br /&gt;
* Create a mount directory (e.g. mkdir rootfs)&lt;br /&gt;
* sudo mount -t ext2 {filename} rootfs&lt;br /&gt;
&lt;br /&gt;
=== Things to check for once the file system is mounted or extracted ===&lt;br /&gt;
* &amp;quot;etc/passwd&amp;quot; and &amp;quot;etc/shadow&amp;quot;&lt;br /&gt;
* &amp;quot;etc/ssl&amp;quot;&lt;br /&gt;
* grep -rnw '/path/to/somewhere/' -e &amp;quot;pattern&amp;quot; like password, admin, root, etc.&lt;br /&gt;
* find . -name '*.conf' and other file types like *.pem, *.crt, *.cfg, .sh, .bin, etc.&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=IoT_Firmware_Analysis&amp;diff=208486</id>
		<title>IoT Firmware Analysis</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=IoT_Firmware_Analysis&amp;diff=208486"/>
				<updated>2016-02-10T22:51:58Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=Firmware_Analysis Back To The Firmware Analysis Project]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Obtain and Analyze Firmware ==&lt;br /&gt;
&lt;br /&gt;
=== Obtain Firmware ===&lt;br /&gt;
* From vendor download site&lt;br /&gt;
* Capture during device update&lt;br /&gt;
* Extract directly from hardware&lt;br /&gt;
&lt;br /&gt;
=== Analyze Firmware File ===&lt;br /&gt;
* Run the &amp;quot;file&amp;quot; command on the *.bin file&lt;br /&gt;
  * We are looking for File to return as &amp;quot;data&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Verify the MD5 signature if you have it&lt;br /&gt;
 * Run the &amp;quot;cat&amp;quot; command on the *.md5 file&lt;br /&gt;
 * Run the &amp;quot;md5sum&amp;quot; command on the *.bin file&lt;br /&gt;
&lt;br /&gt;
* Run &amp;quot;strings&amp;quot; against *.bin file&lt;br /&gt;
 * ex. &amp;quot;strings -n 10 xyz.bin &amp;gt; strings.out&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;less strings.out&amp;quot;&lt;br /&gt;
 * Running strings can give deeper insight into the file&lt;br /&gt;
&lt;br /&gt;
* Run &amp;quot;hexdump&amp;quot; against *.bin file&lt;br /&gt;
 * ex. &amp;quot;hexdump -C -n 512 xyz.bin &amp;gt; hexdump.out&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;cat hexdump.out&amp;quot;&lt;br /&gt;
 * Running hexdump can help identify the type of firmware build&lt;br /&gt;
&lt;br /&gt;
* &amp;quot;binwalk&amp;quot; will be one of the primary tools used for analyzing, reverse engineering and extracting data from the firmware image&lt;br /&gt;
 * ex. &amp;quot;binwalk xyz.bin&amp;quot;&lt;br /&gt;
 * We are looking for binwalk to identify the type of file system in use, ex. squashfs filesystem&lt;br /&gt;
&lt;br /&gt;
=== Extracting the File System from the Firmware File ===&lt;br /&gt;
* Run binwalk against the firmware file&lt;br /&gt;
 * ex. &amp;quot;binwalk xyz.bin&amp;quot;&lt;br /&gt;
 * Again, we are looking for binwalk to hopefully identify the file system&lt;br /&gt;
&lt;br /&gt;
* Extracting the filesystme using &amp;quot;dd&amp;quot;&lt;br /&gt;
 * Assuming binwalk has identified a valid file system like squashfs for example, we can use &amp;quot;dd&amp;quot; as one way to extract the file system&lt;br /&gt;
 * ex. &amp;quot;dd if=xyz.bin bs=1 skip=922460 count=2522318 of=xyz.squashfs&amp;quot;&lt;br /&gt;
 * Note: skip and count values will vary depending on your specific bin file&lt;br /&gt;
 &lt;br /&gt;
* Following extraction of the filesystem assuming it is squashfs, we can expand the contents by running &amp;quot;sasquatch&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;sasquatch xys.squashfs&amp;quot;&lt;br /&gt;
 * &amp;quot;cd&amp;quot; into &amp;quot;squash-root&amp;quot; and have a look around for interesting things&lt;br /&gt;
 * Some examples include:&lt;br /&gt;
 * /etc/ssl&lt;br /&gt;
 * /etc/passwd&lt;br /&gt;
 * /etc/shadow&lt;br /&gt;
 * .ssh/authorized_keys&lt;br /&gt;
&lt;br /&gt;
=== Using the Firmware Modification Kit ===&lt;br /&gt;
* The firmware modification kit can be used to attempt extracting a file system that is is not the traditional squashfs file system&lt;br /&gt;
* Typically if you run hexedit on the firmware file you will see &amp;quot;sqsh&amp;quot; at the beginning of the file, however if you see something like &amp;quot;shsq&amp;quot; it's probable that the file system has been modified.&lt;br /&gt;
* After we dd the firmware file to extract the squashfs file system, we can attempt to run &amp;quot;unsquashfs&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;unsquashfs xyz.squashfs&lt;br /&gt;
 * If that does not work, we can try &amp;quot;unsquashfs_all&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;unsquashfs_all.sh xyz.bin&amp;quot;&lt;br /&gt;
 * Assuming that works, you can view the file system at &amp;quot;fmk/rootfs&amp;quot;&lt;br /&gt;
 * You can also simply run the extract-firmware.sh script under the fmk directory&lt;br /&gt;
&lt;br /&gt;
=== Extracting and Running Binaries ===&lt;br /&gt;
* We might want to see how identified binaries behave without running them on the device itself&lt;br /&gt;
* One way to identify potentially interesting binaries is by examining the startup script from the device which we can discover by extracting the file system&lt;br /&gt;
* QEMU emulation is also another way to examine binaries&lt;br /&gt;
&lt;br /&gt;
=== Extracting a jffs2 file system ===&lt;br /&gt;
* Use the &amp;quot;unjffs2&amp;quot; batch file which is part of the firmware modification kit. &amp;quot;/firmware-mod-kit/src/jffs2/unjffs2&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== Extracting from a CPIO archive file ===&lt;br /&gt;
* cpio -ivd --no-absolute-filenames -F {filename}&lt;br /&gt;
&lt;br /&gt;
=== Extracting from a UBI file system ===&lt;br /&gt;
* Ensure Python Setuptools is installed for UBI Reader to install properly (sudo apt-get install python-setuptools)&lt;br /&gt;
* Ensure UBI Reader is installed (https://github.com/jrspruitt/ubi_reader)&lt;br /&gt;
* Run binwalk -e {filename}&lt;br /&gt;
&lt;br /&gt;
=== Things to check for once the file system is mounted or extracted ===&lt;br /&gt;
* &amp;quot;etc/passwd&amp;quot; and &amp;quot;etc/shadow&amp;quot;&lt;br /&gt;
* &amp;quot;etc/ssl&amp;quot;&lt;br /&gt;
* grep -rnw '/path/to/somewhere/' -e &amp;quot;pattern&amp;quot; like password, admin, root, etc.&lt;br /&gt;
* find . -name '*.conf' and other file types like *.pem, *.crt, *.cfg, .sh, .bin, etc.&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=IoT_Firmware_Analysis&amp;diff=208485</id>
		<title>IoT Firmware Analysis</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=IoT_Firmware_Analysis&amp;diff=208485"/>
				<updated>2016-02-10T22:51:37Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=Firmware_Analysis Back To The Firmware Analysis Project]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Obtain and Analyze Firmware ==&lt;br /&gt;
&lt;br /&gt;
=== Obtain Firmware ===&lt;br /&gt;
* From vendor download site&lt;br /&gt;
* Capture during device update&lt;br /&gt;
* Extract directly from hardware&lt;br /&gt;
&lt;br /&gt;
=== Analyze Firmware File ===&lt;br /&gt;
* Run the &amp;quot;file&amp;quot; command on the *.bin file&lt;br /&gt;
  * We are looking for File to return as &amp;quot;data&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Verify the MD5 signature if you have it&lt;br /&gt;
 * Run the &amp;quot;cat&amp;quot; command on the *.md5 file&lt;br /&gt;
 * Run the &amp;quot;md5sum&amp;quot; command on the *.bin file&lt;br /&gt;
&lt;br /&gt;
* Run &amp;quot;strings&amp;quot; against *.bin file&lt;br /&gt;
 * ex. &amp;quot;strings -n 10 xyz.bin &amp;gt; strings.out&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;less strings.out&amp;quot;&lt;br /&gt;
 * Running strings can give deeper insight into the file&lt;br /&gt;
&lt;br /&gt;
* Run &amp;quot;hexdump&amp;quot; against *.bin file&lt;br /&gt;
 * ex. &amp;quot;hexdump -C -n 512 xyz.bin &amp;gt; hexdump.out&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;cat hexdump.out&amp;quot;&lt;br /&gt;
 * Running hexdump can help identify the type of firmware build&lt;br /&gt;
&lt;br /&gt;
* &amp;quot;binwalk&amp;quot; will be one of the primary tools used for analyzing, reverse engineering and extracting data from the firmware image&lt;br /&gt;
 * ex. &amp;quot;binwalk xyz.bin&amp;quot;&lt;br /&gt;
 * We are looking for binwalk to identify the type of file system in use, ex. squashfs filesystem&lt;br /&gt;
&lt;br /&gt;
=== Extracting the File System from the Firmware File ===&lt;br /&gt;
* Run binwalk against the firmware file&lt;br /&gt;
 * ex. &amp;quot;binwalk xyz.bin&amp;quot;&lt;br /&gt;
 * Again, we are looking for binwalk to hopefully identify the file system&lt;br /&gt;
&lt;br /&gt;
* Extracting the filesystme using &amp;quot;dd&amp;quot;&lt;br /&gt;
 * Assuming binwalk has identified a valid file system like squashfs for example, we can use &amp;quot;dd&amp;quot; as one way to extract the file system&lt;br /&gt;
 * ex. &amp;quot;dd if=xyz.bin bs=1 skip=922460 count=2522318 of=xyz.squashfs&amp;quot;&lt;br /&gt;
 * Note: skip and count values will vary depending on your specific bin file&lt;br /&gt;
 &lt;br /&gt;
* Following extraction of the filesystem assuming it is squashfs, we can expand the contents by running &amp;quot;sasquatch&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;sasquatch xys.squashfs&amp;quot;&lt;br /&gt;
 * &amp;quot;cd&amp;quot; into &amp;quot;squash-root&amp;quot; and have a look around for interesting things&lt;br /&gt;
 * Some examples include:&lt;br /&gt;
 * /etc/ssl&lt;br /&gt;
 * /etc/passwd&lt;br /&gt;
 * /etc/shadow&lt;br /&gt;
 * .ssh/authorized_keys&lt;br /&gt;
&lt;br /&gt;
=== Using the Firmware Modification Kit ===&lt;br /&gt;
* The firmware modification kit can be used to attempt extracting a file system that is is not the traditional squashfs file system&lt;br /&gt;
* Typically if you run hexedit on the firmware file you will see &amp;quot;sqsh&amp;quot; at the beginning of the file, however if you see something like &amp;quot;shsq&amp;quot; it's probable that the file system has been modified.&lt;br /&gt;
* After we dd the firmware file to extract the squashfs file system, we can attempt to run &amp;quot;unsquashfs&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;unsquashfs xyz.squashfs&lt;br /&gt;
 * If that does not work, we can try &amp;quot;unsquashfs_all&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;unsquashfs_all.sh xyz.bin&amp;quot;&lt;br /&gt;
 * Assuming that works, you can view the file system at &amp;quot;fmk/rootfs&amp;quot;&lt;br /&gt;
 * You can also simply run the extract-firmware.sh script under the fmk directory&lt;br /&gt;
&lt;br /&gt;
=== Extracting and Running Binaries ===&lt;br /&gt;
* We might want to see how identified binaries behave without running them on the device itself&lt;br /&gt;
* One way to identify potentially interesting binaries is by examining the startup script from the device which we can discover by extracting the file system&lt;br /&gt;
* QEMU emulation is also another way to examine binaries&lt;br /&gt;
&lt;br /&gt;
=== Extracting a jffs2 file system ===&lt;br /&gt;
* Use the &amp;quot;unjffs2&amp;quot; batch file which is part of the firmware modification kit. &amp;quot;/opt/firmware-mod-kit/src/jffs2/unjffs2&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== Extracting from a CPIO archive file ===&lt;br /&gt;
* cpio -ivd --no-absolute-filenames -F {filename}&lt;br /&gt;
&lt;br /&gt;
=== Extracting from a UBI file system ===&lt;br /&gt;
* Ensure Python Setuptools is installed for UBI Reader to install properly (sudo apt-get install python-setuptools)&lt;br /&gt;
* Ensure UBI Reader is installed (https://github.com/jrspruitt/ubi_reader)&lt;br /&gt;
* Run binwalk -e {filename}&lt;br /&gt;
&lt;br /&gt;
=== Things to check for once the file system is mounted or extracted ===&lt;br /&gt;
* &amp;quot;etc/passwd&amp;quot; and &amp;quot;etc/shadow&amp;quot;&lt;br /&gt;
* &amp;quot;etc/ssl&amp;quot;&lt;br /&gt;
* grep -rnw '/path/to/somewhere/' -e &amp;quot;pattern&amp;quot; like password, admin, root, etc.&lt;br /&gt;
* find . -name '*.conf' and other file types like *.pem, *.crt, *.cfg, .sh, .bin, etc.&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=IoT_Firmware_Analysis&amp;diff=208482</id>
		<title>IoT Firmware Analysis</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=IoT_Firmware_Analysis&amp;diff=208482"/>
				<updated>2016-02-10T22:42:48Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=Firmware_Analysis Back To The Firmware Analysis Project]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Obtain and Analyze Firmware ==&lt;br /&gt;
&lt;br /&gt;
=== Obtain Firmware ===&lt;br /&gt;
* From vendor download site&lt;br /&gt;
* Capture during device update&lt;br /&gt;
* Extract directly from hardware&lt;br /&gt;
&lt;br /&gt;
=== Analyze Firmware File ===&lt;br /&gt;
* Run the &amp;quot;file&amp;quot; command on the *.bin file&lt;br /&gt;
  * We are looking for File to return as &amp;quot;data&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Verify the MD5 signature if you have it&lt;br /&gt;
 * Run the &amp;quot;cat&amp;quot; command on the *.md5 file&lt;br /&gt;
 * Run the &amp;quot;md5sum&amp;quot; command on the *.bin file&lt;br /&gt;
&lt;br /&gt;
* Run &amp;quot;strings&amp;quot; against *.bin file&lt;br /&gt;
 * ex. &amp;quot;strings -n 10 xyz.bin &amp;gt; strings.out&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;less strings.out&amp;quot;&lt;br /&gt;
 * Running strings can give deeper insight into the file&lt;br /&gt;
&lt;br /&gt;
* Run &amp;quot;hexdump&amp;quot; against *.bin file&lt;br /&gt;
 * ex. &amp;quot;hexdump -C -n 512 xyz.bin &amp;gt; hexdump.out&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;cat hexdump.out&amp;quot;&lt;br /&gt;
 * Running hexdump can help identify the type of firmware build&lt;br /&gt;
&lt;br /&gt;
* &amp;quot;binwalk&amp;quot; will be one of the primary tools used for analyzing, reverse engineering and extracting data from the firmware image&lt;br /&gt;
 * ex. &amp;quot;binwalk xyz.bin&amp;quot;&lt;br /&gt;
 * We are looking for binwalk to identify the type of file system in use, ex. squashfs filesystem&lt;br /&gt;
&lt;br /&gt;
=== Extracting the File System from the Firmware File ===&lt;br /&gt;
* Run binwalk against the firmware file&lt;br /&gt;
 * ex. &amp;quot;binwalk xyz.bin&amp;quot;&lt;br /&gt;
 * Again, we are looking for binwalk to hopefully identify the file system&lt;br /&gt;
&lt;br /&gt;
* Extracting the filesystme using &amp;quot;dd&amp;quot;&lt;br /&gt;
 * Assuming binwalk has identified a valid file system like squashfs for example, we can use &amp;quot;dd&amp;quot; as one way to extract the file system&lt;br /&gt;
 * ex. &amp;quot;dd if=xyz.bin bs=1 skip=922460 count=2522318 of=xyz.squashfs&amp;quot;&lt;br /&gt;
 * Note: skip and count values will vary depending on your specific bin file&lt;br /&gt;
 &lt;br /&gt;
* Following extraction of the filesystem assuming it is squashfs, we can expand the contents by running &amp;quot;sasquatch&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;sasquatch xys.squashfs&amp;quot;&lt;br /&gt;
 * &amp;quot;cd&amp;quot; into &amp;quot;squash-root&amp;quot; and have a look around for interesting things&lt;br /&gt;
 * Some examples include:&lt;br /&gt;
 * /etc/ssl&lt;br /&gt;
 * /etc/passwd&lt;br /&gt;
 * /etc/shadow&lt;br /&gt;
 * .ssh/authorized_keys&lt;br /&gt;
&lt;br /&gt;
=== Using the Firmware Modification Kit ===&lt;br /&gt;
* The firmware modification kit can be used to attempt extracting a file system that is is not the traditional squashfs file system&lt;br /&gt;
* Typically if you run hexedit on the firmware file you will see &amp;quot;sqsh&amp;quot; at the beginning of the file, however if you see something like &amp;quot;shsq&amp;quot; it's probable that the file system has been modified.&lt;br /&gt;
* After we dd the firmware file to extract the squashfs file system, we can attempt to run &amp;quot;unsquashfs&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;unsquashfs xyz.squashfs&lt;br /&gt;
 * If that does not work, we can try &amp;quot;unsquashfs_all&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;unsquashfs_all.sh xyz.bin&amp;quot;&lt;br /&gt;
 * Assuming that works, you can view the file system at &amp;quot;fmk/rootfs&amp;quot;&lt;br /&gt;
 * You can also simply run the extract-firmware.sh script under the fmk directory&lt;br /&gt;
&lt;br /&gt;
=== Extracting and Running Binaries ===&lt;br /&gt;
* We might want to see how identified binaries behave without running them on the device itself&lt;br /&gt;
* One way to identify potentially interesting binaries is by examining the startup script from the device which we can discover by extracting the file system&lt;br /&gt;
* QEMU emulation is also another way to examine binaries&lt;br /&gt;
&lt;br /&gt;
=== Mounting jffs2 file system ===&lt;br /&gt;
* Use the &amp;quot;unjffs2&amp;quot; batch file which is part of the firmware modification kit. &amp;quot;/opt/firmware-mod-kit/src/jffs2/unjffs2&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== Extracting from a CPIO archive file ===&lt;br /&gt;
* cpio -ivd --no-absolute-filenames -F {filename}&lt;br /&gt;
&lt;br /&gt;
=== Extracting from a UBI file system ===&lt;br /&gt;
* Ensure Python Setuptools is installed for UBI Reader to install properly (sudo apt-get install python-setuptools)&lt;br /&gt;
* Ensure UBI Reader is installed (https://github.com/jrspruitt/ubi_reader)&lt;br /&gt;
* Run binwalk -e {filename}&lt;br /&gt;
&lt;br /&gt;
=== Things to check for once the file system is mounted or extracted ===&lt;br /&gt;
* &amp;quot;etc/passwd&amp;quot; and &amp;quot;etc/shadow&amp;quot;&lt;br /&gt;
* &amp;quot;etc/ssl&amp;quot;&lt;br /&gt;
* grep -rnw '/path/to/somewhere/' -e &amp;quot;pattern&amp;quot; like password, admin, root, etc.&lt;br /&gt;
* find . -name '*.conf' and other file types like *.pem, *.crt, *.cfg, .sh, .bin, etc.&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=IoT_Firmware_Analysis&amp;diff=208070</id>
		<title>IoT Firmware Analysis</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=IoT_Firmware_Analysis&amp;diff=208070"/>
				<updated>2016-02-03T21:05:54Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=Firmware_Analysis Back To The Firmware Analysis Project]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Obtain and Analyze Firmware ==&lt;br /&gt;
&lt;br /&gt;
=== Obtain Firmware ===&lt;br /&gt;
* From vendor download site&lt;br /&gt;
* Capture during device update&lt;br /&gt;
* Extract directly from hardware&lt;br /&gt;
&lt;br /&gt;
=== Analyze Firmware File ===&lt;br /&gt;
* Run the &amp;quot;file&amp;quot; command on the *.bin file&lt;br /&gt;
  * We are looking for File to return as &amp;quot;data&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Verify the MD5 signature if you have it&lt;br /&gt;
 * Run the &amp;quot;cat&amp;quot; command on the *.md5 file&lt;br /&gt;
 * Run the &amp;quot;md5sum&amp;quot; command on the *.bin file&lt;br /&gt;
&lt;br /&gt;
* Run &amp;quot;strings&amp;quot; against *.bin file&lt;br /&gt;
 * ex. &amp;quot;strings -n 10 xyz.bin &amp;gt; strings.out&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;less strings.out&amp;quot;&lt;br /&gt;
 * Running strings can give deeper insight into the file&lt;br /&gt;
&lt;br /&gt;
* Run &amp;quot;hexdump&amp;quot; against *.bin file&lt;br /&gt;
 * ex. &amp;quot;hexdump -C -n 512 xyz.bin &amp;gt; hexdump.out&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;cat hexdump.out&amp;quot;&lt;br /&gt;
 * Running hexdump can help identify the type of firmware build&lt;br /&gt;
&lt;br /&gt;
* &amp;quot;binwalk&amp;quot; will be one of the primary tools used for analyzing, reverse engineering and extracting data from the firmware image&lt;br /&gt;
 * ex. &amp;quot;binwalk xyz.bin&amp;quot;&lt;br /&gt;
 * We are looking for binwalk to identify the type of file system in use, ex. squashfs filesystem&lt;br /&gt;
&lt;br /&gt;
=== Extracting the File System from the Firmware File ===&lt;br /&gt;
* Run binwalk against the firmware file&lt;br /&gt;
 * ex. &amp;quot;binwalk xyz.bin&amp;quot;&lt;br /&gt;
 * Again, we are looking for binwalk to hopefully identify the file system&lt;br /&gt;
&lt;br /&gt;
* Extracting the filesystme using &amp;quot;dd&amp;quot;&lt;br /&gt;
 * Assuming binwalk has identified a valid file system like squashfs for example, we can use &amp;quot;dd&amp;quot; as one way to extract the file system&lt;br /&gt;
 * ex. &amp;quot;dd if=xyz.bin bs=1 skip=922460 count=2522318 of=xyz.squashfs&amp;quot;&lt;br /&gt;
 * Note: skip and count values will vary depending on your specific bin file&lt;br /&gt;
 &lt;br /&gt;
* Following extraction of the filesystem assuming it is squashfs, we can expand the contents by running &amp;quot;sasquatch&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;sasquatch xys.squashfs&amp;quot;&lt;br /&gt;
 * &amp;quot;cd&amp;quot; into &amp;quot;squash-root&amp;quot; and have a look around for interesting things&lt;br /&gt;
 * Some examples include:&lt;br /&gt;
 * /etc/ssl&lt;br /&gt;
 * /etc/passwd&lt;br /&gt;
 * /etc/shadow&lt;br /&gt;
 * .ssh/authorized_keys&lt;br /&gt;
&lt;br /&gt;
=== Using the Firmware Modification Kit ===&lt;br /&gt;
* The firmware modification kit can be used to attempt extracting a file system that is is not the traditional squashfs file system&lt;br /&gt;
* Typically if you run hexedit on the firmware file you will see &amp;quot;sqsh&amp;quot; at the beginning of the file, however if you see something like &amp;quot;shsq&amp;quot; it's probable that the file system has been modified.&lt;br /&gt;
* After we dd the firmware file to extract the squashfs file system, we can attempt to run &amp;quot;unsquashfs&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;unsquashfs xyz.squashfs&lt;br /&gt;
 * If that does not work, we can try &amp;quot;unsquashfs_all&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;unsquashfs_all.sh xyz.bin&amp;quot;&lt;br /&gt;
 * Assuming that works, you can view the file system at &amp;quot;fmk/rootfs&amp;quot;&lt;br /&gt;
 * You can also simply run the extract-firmware.sh script under the fmk directory&lt;br /&gt;
&lt;br /&gt;
=== Extracting and Running Binaries ===&lt;br /&gt;
* We might want to see how identified binaries behave without running them on the device itself&lt;br /&gt;
* One way to identify potentially interesting binaries is by examining the startup script from the device which we can discover by extracting the file system&lt;br /&gt;
* QEMU emulation is also another way to examine binaries&lt;br /&gt;
&lt;br /&gt;
=== Mounting jffs2 file system ===&lt;br /&gt;
* Use the &amp;quot;unjffs2&amp;quot; batch file which is part of the firmware modification kit. &amp;quot;/opt/firmware-mod-kit/src/jffs2/unjffs2&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== Extracting from a CPIO archive file ===&lt;br /&gt;
* cpio -ivd --no-absolute-filenames -F {filename}&lt;br /&gt;
&lt;br /&gt;
=== Things to check for once the file system is mounted or extracted ===&lt;br /&gt;
* &amp;quot;etc/passwd&amp;quot; and &amp;quot;etc/shadow&amp;quot;&lt;br /&gt;
* &amp;quot;etc/ssl&amp;quot;&lt;br /&gt;
* grep -rnw '/path/to/somewhere/' -e &amp;quot;pattern&amp;quot; like password, admin, root, etc.&lt;br /&gt;
* find . -name '*.conf' and other file types like *.pem, *.crt, *.cfg, .sh, .bin, etc.&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=IoT_Firmware_Analysis&amp;diff=208069</id>
		<title>IoT Firmware Analysis</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=IoT_Firmware_Analysis&amp;diff=208069"/>
				<updated>2016-02-03T21:03:48Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=Firmware_Analysis Back To The Firmware Analysis Project]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Obtain and Analyze Firmware ==&lt;br /&gt;
&lt;br /&gt;
=== Obtain Firmware ===&lt;br /&gt;
* From vendor download site&lt;br /&gt;
* Capture during device update&lt;br /&gt;
* Extract directly from hardware&lt;br /&gt;
&lt;br /&gt;
=== Analyze Firmware File ===&lt;br /&gt;
* Run the &amp;quot;file&amp;quot; command on the *.bin file&lt;br /&gt;
  * We are looking for File to return as &amp;quot;data&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Verify the MD5 signature if you have it&lt;br /&gt;
 * Run the &amp;quot;cat&amp;quot; command on the *.md5 file&lt;br /&gt;
 * Run the &amp;quot;md5sum&amp;quot; command on the *.bin file&lt;br /&gt;
&lt;br /&gt;
* Run &amp;quot;strings&amp;quot; against *.bin file&lt;br /&gt;
 * ex. &amp;quot;strings -n 10 xyz.bin &amp;gt; strings.out&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;less strings.out&amp;quot;&lt;br /&gt;
 * Running strings can give deeper insight into the file&lt;br /&gt;
&lt;br /&gt;
* Run &amp;quot;hexdump&amp;quot; against *.bin file&lt;br /&gt;
 * ex. &amp;quot;hexdump -C -n 512 xyz.bin &amp;gt; hexdump.out&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;cat hexdump.out&amp;quot;&lt;br /&gt;
 * Running hexdump can help identify the type of firmware build&lt;br /&gt;
&lt;br /&gt;
* &amp;quot;binwalk&amp;quot; will be one of the primary tools used for analyzing, reverse engineering and extracting data from the firmware image&lt;br /&gt;
 * ex. &amp;quot;binwalk xyz.bin&amp;quot;&lt;br /&gt;
 * We are looking for binwalk to identify the type of file system in use, ex. squashfs filesystem&lt;br /&gt;
&lt;br /&gt;
=== Extracting the File System from the Firmware File ===&lt;br /&gt;
* Run binwalk against the firmware file&lt;br /&gt;
 * ex. &amp;quot;binwalk xyz.bin&amp;quot;&lt;br /&gt;
 * Again, we are looking for binwalk to hopefully identify the file system&lt;br /&gt;
&lt;br /&gt;
* Extracting the filesystme using &amp;quot;dd&amp;quot;&lt;br /&gt;
 * Assuming binwalk has identified a valid file system like squashfs for example, we can use &amp;quot;dd&amp;quot; as one way to extract the file system&lt;br /&gt;
 * ex. &amp;quot;dd if=xyz.bin bs=1 skip=922460 count=2522318 of=xyz.squashfs&amp;quot;&lt;br /&gt;
 * Note: skip and count values will vary depending on your specific bin file&lt;br /&gt;
 &lt;br /&gt;
* Following extraction of the filesystem assuming it is squashfs, we can expand the contents by running &amp;quot;sasquatch&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;sasquatch xys.squashfs&amp;quot;&lt;br /&gt;
 * &amp;quot;cd&amp;quot; into &amp;quot;squash-root&amp;quot; and have a look around for interesting things&lt;br /&gt;
 * Some examples include:&lt;br /&gt;
 * /etc/ssl&lt;br /&gt;
 * /etc/passwd&lt;br /&gt;
 * /etc/shadow&lt;br /&gt;
 * /etc/ssh/authorized_keys&lt;br /&gt;
&lt;br /&gt;
=== Using the Firmware Modification Kit ===&lt;br /&gt;
* The firmware modification kit can be used to attempt extracting a file system that is is not the traditional squashfs file system&lt;br /&gt;
* Typically if you run hexedit on the firmware file you will see &amp;quot;sqsh&amp;quot; at the beginning of the file, however if you see something like &amp;quot;shsq&amp;quot; it's probable that the file system has been modified.&lt;br /&gt;
* After we dd the firmware file to extract the squashfs file system, we can attempt to run &amp;quot;unsquashfs&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;unsquashfs xyz.squashfs&lt;br /&gt;
 * If that does not work, we can try &amp;quot;unsquashfs_all&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;unsquashfs_all.sh xyz.bin&amp;quot;&lt;br /&gt;
 * Assuming that works, you can view the file system at &amp;quot;fmk/rootfs&amp;quot;&lt;br /&gt;
 * You can also simply run the extract-firmware.sh script under the fmk directory&lt;br /&gt;
&lt;br /&gt;
=== Extracting and Running Binaries ===&lt;br /&gt;
* We might want to see how identified binaries behave without running them on the device itself&lt;br /&gt;
* One way to identify potentially interesting binaries is by examining the startup script from the device which we can discover by extracting the file system&lt;br /&gt;
* QEMU emulation is also another way to examine binaries&lt;br /&gt;
&lt;br /&gt;
=== Mounting jffs2 file system ===&lt;br /&gt;
* Use the &amp;quot;unjffs2&amp;quot; batch file which is part of the firmware modification kit. &amp;quot;/opt/firmware-mod-kit/src/jffs2/unjffs2&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== Extracting from a CPIO archive file ===&lt;br /&gt;
* cpio -ivd --no-absolute-filenames -F {filename}&lt;br /&gt;
&lt;br /&gt;
=== Things to check for once the file system is mounted or extracted ===&lt;br /&gt;
* &amp;quot;etc/passwd&amp;quot; and &amp;quot;etc/shadow&amp;quot;&lt;br /&gt;
* &amp;quot;etc/ssl&amp;quot;&lt;br /&gt;
* grep -rnw '/path/to/somewhere/' -e &amp;quot;pattern&amp;quot; like password, admin, root, etc.&lt;br /&gt;
* find . -name '*.conf' and other file types like *.pem, *.crt, *.cfg, .sh, .bin, etc.&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=IoT_Firmware_Analysis&amp;diff=208068</id>
		<title>IoT Firmware Analysis</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=IoT_Firmware_Analysis&amp;diff=208068"/>
				<updated>2016-02-03T21:02:19Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=Firmware_Analysis Back To The Firmware Analysis Project]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Obtain and Analyze Firmware ==&lt;br /&gt;
&lt;br /&gt;
=== Obtain Firmware ===&lt;br /&gt;
* From vendor download site&lt;br /&gt;
* Capture during device update&lt;br /&gt;
* Extract directly from hardware&lt;br /&gt;
&lt;br /&gt;
=== Analyze Firmware File ===&lt;br /&gt;
* Run the &amp;quot;file&amp;quot; command on the *.bin file&lt;br /&gt;
  * We are looking for File to return as &amp;quot;data&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Verify the MD5 signature if you have it&lt;br /&gt;
 * Run the &amp;quot;cat&amp;quot; command on the *.md5 file&lt;br /&gt;
 * Run the &amp;quot;md5sum&amp;quot; command on the *.bin file&lt;br /&gt;
&lt;br /&gt;
* Run &amp;quot;strings&amp;quot; against *.bin file&lt;br /&gt;
 * ex. &amp;quot;strings -n 10 xyz.bin &amp;gt; strings.out&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;less strings.out&amp;quot;&lt;br /&gt;
 * Running strings can give deeper insight into the file&lt;br /&gt;
&lt;br /&gt;
* Run &amp;quot;hexdump&amp;quot; against *.bin file&lt;br /&gt;
 * ex. &amp;quot;hexdump -C -n 512 xyz.bin &amp;gt; hexdump.out&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;cat hexdump.out&amp;quot;&lt;br /&gt;
 * Running hexdump can help identify the type of firmware build&lt;br /&gt;
&lt;br /&gt;
* &amp;quot;binwalk&amp;quot; will be one of the primary tools used for analyzing, reverse engineering and extracting data from the firmware image&lt;br /&gt;
 * ex. &amp;quot;binwalk xyz.bin&amp;quot;&lt;br /&gt;
 * We are looking for binwalk to identify the type of file system in use, ex. squashfs filesystem&lt;br /&gt;
&lt;br /&gt;
=== Extracting the File System from the Firmware File ===&lt;br /&gt;
* Run binwalk against the firmware file&lt;br /&gt;
 * ex. &amp;quot;binwalk xyz.bin&amp;quot;&lt;br /&gt;
 * Again, we are looking for binwalk to hopefully identify the file system&lt;br /&gt;
&lt;br /&gt;
* Extracting the filesystme using &amp;quot;dd&amp;quot;&lt;br /&gt;
 * Assuming binwalk has identified a valid file system like squashfs for example, we can use &amp;quot;dd&amp;quot; as one way to extract the file system&lt;br /&gt;
 * ex. &amp;quot;dd if=xyz.bin bs=1 skip=922460 count=2522318 of=xyz.squashfs&amp;quot;&lt;br /&gt;
 * Note: skip and count values will vary depending on your specific bin file&lt;br /&gt;
 &lt;br /&gt;
* Following extraction of the filesystem assuming it is squashfs, we can expand the contents by running &amp;quot;sasquatch&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;sasquatch xys.squashfs&amp;quot;&lt;br /&gt;
 * &amp;quot;cd&amp;quot; into &amp;quot;squash-root&amp;quot; and have a look around for interesting things&lt;br /&gt;
 * Some examples include:&lt;br /&gt;
 * /etc/banner&lt;br /&gt;
 * /etc/openwrt_version&lt;br /&gt;
 * /etc/openwrt_release&lt;br /&gt;
 * /etc/dropbear/authorized_keys&lt;br /&gt;
&lt;br /&gt;
=== Using the Firmware Modification Kit ===&lt;br /&gt;
* The firmware modification kit can be used to attempt extracting a file system that is is not the traditional squashfs file system&lt;br /&gt;
* Typically if you run hexedit on the firmware file you will see &amp;quot;sqsh&amp;quot; at the beginning of the file, however if you see something like &amp;quot;shsq&amp;quot; it's probable that the file system has been modified.&lt;br /&gt;
* After we dd the firmware file to extract the squashfs file system, we can attempt to run &amp;quot;unsquashfs&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;unsquashfs xyz.squashfs&lt;br /&gt;
 * If that does not work, we can try &amp;quot;unsquashfs_all&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;unsquashfs_all.sh xyz.bin&amp;quot;&lt;br /&gt;
 * Assuming that works, you can view the file system at &amp;quot;fmk/rootfs&amp;quot;&lt;br /&gt;
 * You can also simply run the extract-firmware.sh script under the fmk directory&lt;br /&gt;
&lt;br /&gt;
=== Extracting and Running Binaries ===&lt;br /&gt;
* We might want to see how identified binaries behave without running them on the device itself&lt;br /&gt;
* One way to identify potentially interesting binaries is by examining the startup script from the device which we can discover by extracting the file system&lt;br /&gt;
* QEMU emulation is also another way to examine binaries&lt;br /&gt;
&lt;br /&gt;
=== Mounting jffs2 file system ===&lt;br /&gt;
* Use the &amp;quot;unjffs2&amp;quot; batch file which is part of the firmware modification kit. &amp;quot;/opt/firmware-mod-kit/src/jffs2/unjffs2&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== Extracting from a CPIO archive file ===&lt;br /&gt;
* cpio -ivd --no-absolute-filenames -F {filename}&lt;br /&gt;
&lt;br /&gt;
=== Things to check for once the file system is mounted or extracted ===&lt;br /&gt;
* &amp;quot;etc/passwd&amp;quot; and &amp;quot;etc/shadow&amp;quot;&lt;br /&gt;
* &amp;quot;etc/ssl&amp;quot;&lt;br /&gt;
* grep -rnw '/path/to/somewhere/' -e &amp;quot;pattern&amp;quot; like password, admin, root, etc.&lt;br /&gt;
* find . -name '*.conf' and other file types like *.pem, *.crt, *.cfg, .sh, .bin, etc.&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=IoT_Firmware_Analysis&amp;diff=208067</id>
		<title>IoT Firmware Analysis</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=IoT_Firmware_Analysis&amp;diff=208067"/>
				<updated>2016-02-03T20:54:25Z</updated>
		
		<summary type="html">&lt;p&gt;Craig Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=Firmware_Analysis Back To The Firmware Analysis Project]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Obtain and Analyze Firmware ==&lt;br /&gt;
&lt;br /&gt;
=== Obtain Firmware ===&lt;br /&gt;
* From vendor download site&lt;br /&gt;
* Capture during device update&lt;br /&gt;
* Extract directly from hardware&lt;br /&gt;
&lt;br /&gt;
=== Analyze Firmware File ===&lt;br /&gt;
* Run the &amp;quot;file&amp;quot; command on the *.bin file&lt;br /&gt;
  * We are looking for File to return as &amp;quot;data&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Verify the MD5 signature if you have it&lt;br /&gt;
 * Run the &amp;quot;cat&amp;quot; command on the *.md5 file&lt;br /&gt;
 * Run the &amp;quot;md5sum&amp;quot; command on the *.bin file&lt;br /&gt;
&lt;br /&gt;
* Run &amp;quot;strings&amp;quot; against *.bin file&lt;br /&gt;
 * ex. &amp;quot;strings -n 10 xyz.bin &amp;gt; strings.out&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;less strings.out&amp;quot;&lt;br /&gt;
 * Running strings can give deeper insight into the file&lt;br /&gt;
&lt;br /&gt;
* Run &amp;quot;hexdump&amp;quot; against *.bin file&lt;br /&gt;
 * ex. &amp;quot;hexdump -C -n 512 xyz.bin &amp;gt; hexdump.out&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;cat hexdump.out&amp;quot;&lt;br /&gt;
 * Running hexdump can help identify the type of firmware build&lt;br /&gt;
&lt;br /&gt;
* &amp;quot;binwalk&amp;quot; will be one of the primary tools used for analyzing, reverse engineering and extracting data from the firmware image&lt;br /&gt;
 * ex. &amp;quot;binwalk xyz.bin&amp;quot;&lt;br /&gt;
 * We are looking for binwalk to identify the type of file system in use, ex. squashfs filesystem&lt;br /&gt;
&lt;br /&gt;
=== Extracting the File System from the Firmware File ===&lt;br /&gt;
* Run binwalk against the firmware file&lt;br /&gt;
 * ex. &amp;quot;binwalk xyz.bin&amp;quot;&lt;br /&gt;
 * Again, we are looking for binwalk to hopefully identify the file system&lt;br /&gt;
&lt;br /&gt;
* Extracting the filesystme using &amp;quot;dd&amp;quot;&lt;br /&gt;
 * Assuming binwalk has identified a valid file system like squashfs for example, we can use &amp;quot;dd&amp;quot; as one way to extract the file system&lt;br /&gt;
 * ex. &amp;quot;dd if=xyz.bin bs=1 skip=922460 count=2522318 of=xyz.squashfs&amp;quot;&lt;br /&gt;
 * Note: skip and count values will vary depending on your specific bin file&lt;br /&gt;
 &lt;br /&gt;
* Following extraction of the filesystem assuming it is squashfs, we can expand the contents by running &amp;quot;sasquatch&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;sasquatch xys.squashfs&amp;quot;&lt;br /&gt;
 * &amp;quot;cd&amp;quot; into &amp;quot;squash-root&amp;quot; and have a look around for interesting things&lt;br /&gt;
 * Some examples include:&lt;br /&gt;
 * /etc/banner&lt;br /&gt;
 * /etc/openwrt_version&lt;br /&gt;
 * /etc/openwrt_release&lt;br /&gt;
 * /etc/dropbear/authorized_keys&lt;br /&gt;
&lt;br /&gt;
=== Using the Firmware Modification Kit ===&lt;br /&gt;
* The firmware modification kit can be used to attempt extracting a file system that is is not the traditional squashfs file system&lt;br /&gt;
* Typically if you run hexedit on the firmware file you will see &amp;quot;sqsh&amp;quot; at the beginning of the file, however if you see something like &amp;quot;shsq&amp;quot; it's probable that the file system has been modified.&lt;br /&gt;
* After we dd the firmware file to extract the squashfs file system, we can attempt to run &amp;quot;unsquashfs&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;unsquashfs xyz.squashfs&lt;br /&gt;
 * If that does not work, we can try &amp;quot;unsquashfs_all&amp;quot;&lt;br /&gt;
 * ex. &amp;quot;unsquashfs_all.sh xyz.bin&amp;quot;&lt;br /&gt;
 * Assuming that works, you can view the file system at &amp;quot;fmk/rootfs&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== Extracting and Running Binaries ===&lt;br /&gt;
* We might want to see how identified binaries behave without running them on the device itself&lt;br /&gt;
* One way to identify potentially interesting binaries is by examining the startup script from the device which we can discover by extracting the file system&lt;br /&gt;
* QEMU emulation is also another way to examine binaries&lt;br /&gt;
&lt;br /&gt;
=== Mounting jffs2 file system ===&lt;br /&gt;
* Use the &amp;quot;unjffs2&amp;quot; batch file which is part of the firmware modification kit. &amp;quot;/opt/firmware-mod-kit/src/jffs2/unjffs2&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== Extracting from a CPIO archive file ===&lt;br /&gt;
* cpio -ivd --no-absolute-filenames -F {filename}&lt;br /&gt;
&lt;br /&gt;
=== Things to check for once the file system is mounted or extracted ===&lt;br /&gt;
* &amp;quot;etc/passwd&amp;quot; and &amp;quot;etc/shadow&amp;quot;&lt;br /&gt;
* &amp;quot;etc/ssl&amp;quot;&lt;br /&gt;
* grep -rnw '/path/to/somewhere/' -e &amp;quot;pattern&amp;quot; like password, admin, root, etc.&lt;br /&gt;
* find . -name '*.conf' and other file types like *.pem, *.crt, *.cfg, .sh, .bin, etc.&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	</feed>