This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Internet of Things Project"
Craig Smith (talk | contribs) |
Craig Smith (talk | contribs) |
||
Line 325: | Line 325: | ||
* Coming Soon | * Coming Soon | ||
+ | |} | ||
+ | |||
+ | = IoT Vulnerabilities = | ||
+ | |||
+ | <div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div> | ||
+ | |||
+ | {| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | ||
+ | | valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | ||
+ | |||
+ | == IoT Vulnerabilities Project == | ||
+ | |||
+ | {| border="1" class="wikitable" style="text-align: left" | ||
+ | ! Vulnerability | ||
+ | ! Attack Surface | ||
+ | ! Summary | ||
+ | |- | ||
+ | | '''Username Enumeration''' | ||
+ | | | ||
+ | * Administrative Interface | ||
+ | * Device Web Interface | ||
+ | * Cloud Interface | ||
+ | * Mobile Application | ||
+ | | | ||
+ | * Ability to collect a set of valid usernames by interacting with the authentication mechanism | ||
+ | |- | ||
+ | | '''Weak Passwords''' | ||
+ | | | ||
+ | * Administrative Interface | ||
+ | * Device Web Interface | ||
+ | * Cloud Interface | ||
+ | * Mobile Application | ||
+ | | | ||
+ | * Ability to set account passwords to '1234' or '123456' for example. | ||
+ | |- | ||
+ | | '''Account Lockout''' | ||
+ | | | ||
+ | * Administrative Interface | ||
+ | * Device Web Interface | ||
+ | * Cloud Interface | ||
+ | * Mobile Application | ||
+ | | | ||
+ | * Ability to continue sending authentication attempts after 3 - 5 failed login attempts | ||
+ | |- | ||
+ | | '''Unencrypted Services''' | ||
+ | | | ||
+ | * Device Network Services | ||
+ | | | ||
+ | * Network services are not properly encrypted to prevent eavesdropping by attackers | ||
+ | |- | ||
+ | | '''Two-factor Authentication''' | ||
+ | | | ||
+ | * Administrative Interface | ||
+ | * Cloud Web Interface | ||
+ | * Mobile Application | ||
+ | | | ||
+ | * Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner | ||
+ | |- | ||
+ | | '''Poorly Implemented Encryption''' | ||
+ | | | ||
+ | * Device Network Services | ||
+ | | | ||
+ | * Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 | ||
+ | |- | ||
+ | | '''Update Sent Without Encryption''' | ||
+ | | | ||
+ | * Update Mechanism | ||
+ | | | ||
+ | * Updates are transmitted over the network without using TLS or encrypting the update file itself | ||
+ | |- | ||
+ | | '''Update Location Writable''' | ||
+ | | | ||
+ | * Update Mechanism | ||
+ | | | ||
+ | * Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users | ||
+ | |- | ||
+ | | '''Denial of Service''' | ||
+ | | | ||
+ | * Device Network Services | ||
+ | | | ||
+ | * Service can be attacked in a way that denies service to that service or the entire device | ||
+ | |- | ||
+ | | '''Removal of Storage Media''' | ||
+ | | | ||
+ | * Device Physical Interfaces | ||
+ | | | ||
+ | * Ability to physically remove the storage media from the device | ||
+ | |- | ||
+ | | '''No Manual Update Mechanism''' | ||
+ | | | ||
+ | * Update Mechanism | ||
+ | | | ||
+ | * No ability to manually force an update check for the device | ||
+ | |- | ||
+ | | '''Missing Update Mechanism''' | ||
+ | | | ||
+ | * Update Mechanism | ||
+ | | | ||
+ | * No ability to update device | ||
+ | |- | ||
+ | | '''Firmware Version Display and/or Last Update Date''' | ||
+ | | | ||
+ | * Device Firmware | ||
+ | | | ||
+ | * Current firmware version is not displayed and/or the last update date is not displayed | ||
+ | |- | ||
+ | |} | ||
+ | |||
+ | == == | ||
+ | {{Social Media Links}} | ||
+ | |||
+ | | valign="top" style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" | | ||
+ | |||
+ | == What is the IoT Vulnerabilities Project? == | ||
+ | |||
+ | The IoT Vulnerabilities Project provides: | ||
+ | |||
+ | * Information on the top IoT vulnerabilities | ||
+ | * The attack surface associated with the vulnerability | ||
+ | * A summary of the vulnerability | ||
+ | |||
+ | == Project Leaders == | ||
+ | |||
+ | * Daniel Miessler | ||
+ | * Craig Smith | ||
+ | |||
+ | == Related Projects == | ||
+ | |||
+ | * [[OWASP_Mobile_Security_Project|OWASP Mobile Security]] | ||
+ | * [[OWASP_Top_Ten_Project|OWASP Web Top 10]] | ||
+ | |||
+ | == Email List == | ||
+ | [mailto:[email protected] Mailing List] | ||
+ | |||
+ | == Resources == | ||
+ | * [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014] | ||
+ | |||
+ | == News and Events == | ||
+ | * Coming Soon | ||
|} | |} |
Revision as of 15:10, 18 May 2016
- Main
- IoT Attack Surface Areas
- IoT Vulnerabilities
- Firmware Analysis
- ICS/SCADA
- IoT Security Policy Project
- Community
- Project About
OWASP Internet of Things (IoT) ProjectOxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.” The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies. The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities. LicensingThe OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.
|
What is the OWASP Internet of Things Project?The OWASP Internet of Things Project provides information on:
Project Leaders
Major ContributorsRelated Projects |
Email ListQuick DownloadIoT Attack Surface Mapping DEFCON 23 News and Events
Classifications |
IoT Attack Surface Areas ProjectThe OWASP IoT Attack Surface Areas (DRAFT) are as follows:
|
What is the IoT Attack Surface Areas Project?The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations. Project Leaders
Related ProjectsEmail ListQuick Download
News and Events
|
IoT Vulnerabilities Project
|
What is the IoT Vulnerabilities Project?The IoT Vulnerabilities Project provides:
Project Leaders
Related ProjectsEmail ListResourcesNews and Events
|
Firmware Analysis ProjectThe Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface "Device Firmware":
|
What is the Firmware Analysis Project?The Firmware Analysis Project provides:
Project Leaders
Related ProjectsEmail ListResources
News and Events
|
ICS/SCADA ProjectThe OWASP ICS/SCADA Top 10 software weaknesses are as follows:
|
What is the ICS/SCADA Project?The ICS/SCADA Project provides:
Project Leaders
Related ProjectsEmail ListQuick Download
News and Events
|
IoT Security Policy ProjectThe OWASP IoT Security Policy Project provides:
|
What is the IoT Security Policies Project?The IoT Security Policy Project provides: Project Leaders
Related ProjectsEmail ListQuick Download
News and Events
|
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.
Their areas of focus include:
- Medical devices
- Automobiles
- Home Electronics
- Public Infrastructure
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.
Their goals include:
- Focus effort towards small business
- Build partnerships
- Coordinate efforts
- Curate informational resources
- Present research
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet. OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the IoT Trustworthy Working Group (ITWG), a multi-stakeholder initiative. The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.
The AllSeen Alliance is a Linux Foundation collaborative project. They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things. The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.
The Industrial Internet Consortium (IIC)
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.
Talks
RSA Conference San Francisco
Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project
Daniel Miessler, Practice Principal
April 21, 2015
---
Defcon 23
IoT Attack Surface Mapping
Daniel Miessler
August 6-9, 2015
Podcasts
IoT Conferences
Conference Call for Papers
PROJECT INFO What does this OWASP project offer you? |
RELEASE(S) INFO What releases are available for this project? | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|