This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Internet of Things Project"

From OWASP
Jump to: navigation, search
(IoT Attack Surface Areas Project)
Line 134: Line 134:
 
* Removal of storage media
 
* Removal of storage media
 
* Tamper resistance
 
* Tamper resistance
 +
* Debug port
 +
* Device ID/Serial number exposure
 
|-
 
|-
 
| '''Device Web Interface'''
 
| '''Device Web Interface'''
Line 155: Line 157:
 
* Backdoor accounts
 
* Backdoor accounts
 
* Vulnerable services (web, ssh, tftp, etc.)
 
* Vulnerable services (web, ssh, tftp, etc.)
 +
* Security related function API exposure
 +
* Firmware downgrade
 
|-  
 
|-  
 
| '''Device Network Services'''
 
| '''Device Network Services'''
Line 170: Line 174:
 
* Vulnerable UDP Services
 
* Vulnerable UDP Services
 
* DoS
 
* DoS
 +
* Device Firmware OTA update block
 +
* Replay attack
 +
* Lack of payload verification
 +
* Lack of message integrity check
 
|-  
 
|-  
 
| '''Administrative Interface'''
 
| '''Administrative Interface'''
Line 190: Line 198:
 
* Data encrypted with discovered keys
 
* Data encrypted with discovered keys
 
* Lack of data integrity checks
 
* Lack of data integrity checks
 +
* Use of static same enc/dec key
 
|-  
 
|-  
 
| '''Cloud Web Interface'''
 
| '''Cloud Web Interface'''
Line 257: Line 266:
 
* Non-standard
 
* Non-standard
 
* Wireless (WiFi, Z-wave, Zigbee, Bluetooth)
 
* Wireless (WiFi, Z-wave, Zigbee, Bluetooth)
 +
* Protocol fuzzing
 
|-  
 
|-  
 
|}
 
|}

Revision as of 08:17, 4 February 2016

OWASP Project Header.jpg

OWASP Internet of Things (IoT) Project

Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”

The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies.

The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.

Iot-project.png

Licensing

The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.


What is the OWASP Internet of Things Project?

The OWASP Internet of Things Project provides:

  • IoT Attack Surface Areas
  • IoT Testing Guides
  • Top 10 IoT Vulnerabilities
  • IoT Security Guidance
  • ICS/SCADA Software Weaknesses
  • Community Information
  • Developer Guidance
  • Design Principles

Project Leaders

  • Daniel Miessler
  • Craig Smith

Major Contributors

Related Projects

Email List

Mailing List

Quick Download

IoT Attack Surface Mapping DEFCON 23

IoT Testing Guidance Handout

OWASP IoT Top Ten PDF

OWASP IoT Top Ten Infographic

OWASP IoT Top Ten PPT

OWASP IoT Top Ten-RSA 2015

OWASP IoT Project Overview

News and Events

  • Daniel Miessler gave his IoT talk at DEFCON 23
  • Migrating the IoT Top Ten to be under the IoT Project
  • HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack.
  • IoT devices averaged 25 vulnerabilities per product, indicating expanding attack surface for adversaries

Classifications

Owasp-incubator-trans-85.png Owasp-builders-small.png
Owasp-defenders-small.png
Cc-button-y-sa-small.png
Project Type Files DOC.jpg