Time
19 hours 55 minutes
Difficulty
Intermediate
CEU/CPE
23

Video Transcription

00:02
I welcome back to the course. In the last video, we talked about the OAS top 10 I ot vulnerabilities. We also talked about different countermeasures for each one of those vulnerabilities
00:12
in this video, we're gonna talk about the eye ot attack service areas, but we're also gonna talk about some of the A I ot hacking tools. Now, I do want to mention before we jump into the surface area is that
00:22
Think of everything we've learned so far in penetration testing, right? So things like foot printing, scanning and new numerator in hacking the system's firewalls, you know, ideas, interesting detection and monitoring that sort of stuff. Just think of all that and a cumulative four I ot devices. So
00:39
we're really gonna follow the same type of penetration methodology
00:42
that we do for just, you know, your server or your regular work station,
00:46
as we do for io ti devices. So we're gonna you know, we're going to do reconnaissance, right? Are scanning and, you know, in in new Marais, Shin and you know, we're gonna figure out ways we can hack the system. We're gonna do different exploits, and we're going to see what kind of data we can get. We're gonna use components like cryptography that will go over in a later module.
01:03
You know, we're gonna use all these different aspects that we normally would in a generalized penetration test
01:08
just on an i o t. Device. So just keep that in mind that all the stuff is interrelated as faras like things like attacks that can be done if you think of like most your wireless attacks, different formats of those can be done on io ti devices, different forms of gathering information. So, for example, let's using, like, M map or showdown
01:26
to gain information. We can use that with coyote devices as well. So just keep all that in mind as you're as we're going through this stuff, that is really
01:33
kind of related, and that's gonna help you a lot on the exam. As far as understanding. Like, what are they actually asking me here so that I should help you a lot of the exam,
01:41
So I'm just gonna read through these different attack surface areas were really just kind of looking at and talking and talking just a little about each one there, but we're really hitting this at an extremely, extremely high level because you you're really not gonna need thio. Dissect this down to further too much further. Excuse me,
02:01
um,
02:01
and reset this stage with the City Council stuff.
02:05
So we've got the ecosystem access control device memory device, physical interfaces on your web interfaces on your device, the actual device firmware. So again, we want to make sure we keep that updated. The device Network service is admin interface. The local data stories. So how's how's the storing that data locally? The Cloud Web interface,
02:23
the ecosystem *** Communications. So how's it communicating
02:27
with different applications?
02:29
The vendor back in AP eyes third party back ndp AP eyes because those might be vulnerable, especially that might be a good tool to get into a device.
02:38
The update mechanism. So can we. Can we figure out how it's updating or how that that device actually works in the architecture level, and then can we find a way to corrupt those updates with whatever we want to do?
02:49
Mobile application, network traffic. So how's the device communicating? And can we exploit the networking that the device is doing? And then also development tools? Right. So Arthur APS that developers are using our there, you know, tools that that we can do to plug in the eye ot device that we can then exploit those.
03:07
So you keep all that stuff in the back your mind. So again is I mentioned It's kind of
03:12
correlating all back to a generalized penetration test of weird hitting all these different areas.
03:17
So the civil there's there's actually a lot of different I ot hacking tools and some of these names you recognize because we've discussed them in other sections. But just think of it again in like you can literally use, you know, different several different tools on these things. So we're just gonna talk about, like, wire sharp burps we binary Ninja I d. A pro and uber tooth one. So
03:38
we know why you're sharp, cause we kind of went over that earlier.
03:40
Eso here's just a screenshot of it. The best lead allows us to capture information
03:46
that's going along the network there so we could see what kind of things you know, maybe a user name or password. We can get
03:52
broke. Sweet. That's for the Web testing. There s So this would allow us to test different components of the coyote device, depending on if it's got, you know, certain features in it
04:03
by now A ninja. So this is a compiler. We can reverse engineer with this so we can reverse engineer code on the II ot device. And we could potentially, you know, crack it, you know, do something with it to exploit it.
04:15
Same with I d. A parole that allows us to river reverse engineer stuff on and again, we can potentially use this to reverse engineer some app on the phone and see about how we can exploit the code in that out.
04:29
And the new Bluetooth one, a kind of a neat little thing, basically allows you to grab Bluetooth communications. And you could grab these off Amazon, or like eBay or something like that. I think the price is when I saw it was like on eBay and I was like, 150 bucks. But I think most of time there under 100 bucks, I think around like, 30 or $40
04:47
or so U S dollars. That is to convert that based on where you're at, but just starts like Amazon for uber tooth one and you'll be able to pick one up. So it's kind of a neat little tool to use.
04:59
So just one post assessment question again at the inn module one there. We've got the real post assessment for you, which is the actual, like, kind of a practice exam for you. But each of these modules, as we've seen go through this course, has a couple of questions here and there, depending on the module, just to kind of test your knowledge a little bit. So
05:15
with this question here, all the following our challenges of I o t. Accept which one.
05:23
All right, so if you said sensors answer, Do you are correct? Now we could potentially argue that that is a challenge, you know? Do we get the sensors? Are they all on a standard? What's going on with that? But really, we're focused on those Those six items they're so three of those are here on the screen the security, the connective ity, and then the intelligent analyst and
05:42
analysis and then the intelligent actions.
05:46
So in this video, we wrapped up our discussion on R I O T devices and the next module module 16 we're gonna talk about clouds. We'll talk about different types of cloud solutions, and service is

Up Next

Penetration Testing and Ethical Hacking

Do you like breaking things or figuring out how things work? Join thousands of professionals who’ve entered the information security field by taking this class. Taking this ethical hacking course will give you the skills needed to become a professional penetration tester and prepare you for industry certifications, like the CEH.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor