IoT PEN TEST
Verify Your Security With a Penetration Test
An IoT pen test enables to search for security flaws in the connected object’s entire ecosystem: hardware, embedded software, communication protocols, servers, mobile applications, APIs and Web interfaces.
Even though IoT security is a major challenge, with the development of smart homes, smart cities, connected health care systems and the 4.0 industry, CSG’s accredited UK team have extensive IoT pen testing experience, helping organisations to identify exposures across a multidude of devices
CSG understands the many challenges of IoT devices such as varying architectures, communication protocols, coding and operating systems which results in almost immeasurable combinations of technology. Therefore, CSG utilise only the most experienced penetration testers for IoT testing.
Their are three main categories for testing IoT device, hardware, firmware and communication protocol testing. CSG can help you device a test strategy to ensure it meets your requirements for either one or all these categories.
Hardware Testing
Penetration tests of hardware focus on the electronic components of the solution (non-invasive and invasive attacks).
Techniques Used
- Reverse engineering of elements extracted from the hardware equipment studied
- Memory dumps
- Cryptographic analysis
Firmware Testing
Penetration tests of firmware focus on the software embedded in the object.
Techniques Used
- Detection of communication ports that are open and badly protected
- Buffer overflow
- Breaking passwords
- Reverse engineering
- Cryptographic analysis
- Modifications of firmware
- Debugging
- Detection of configuration interfaces or backdoors measures to mitigate risk
Communication Protocol Testing
Penetration tests of communication protocols focus on the technology enabling the communication of the object and the sending of data to the outside (RFID, NFC, ZigBee, Bluetooth, WiFi, SigFox, LoRa, etc.).
Techniques Used
- Capture and analysis of multi-protocol radio signals (sniffing)
- Cryptographic analysis
- Passive monitoring of exchanges
- Interception and corruption of exchanges
- Denials of service
Methodology
CSG’s Comprehensive Testing Methodology
01. Reconnaissance
Initial reconnaissance activities to locate responding hosts and services across each public IP range and facilitate the development of the target list.
02. Target Planning
Initial targets are selected based on perceived opportunity and prioritized for first stage attacks.
03. Vulnerability Enumeration
Vulnerabilities, both published and undocumented, are enumerated to identify potential exploits to pursue on each targeted host.
04. Vulnerability Validation
Additional testing to confirm valid vulnerabilities, eliminate false positives, and validate target selection.
05. Attack Planning
Utilizing the information gathered, the methods, tools, and approaches are selected to pursue services likely to present opportunity to gain access.
06. Exploit Execution
Tests are conducted to establish command and control, ideally with persistence, to vulnerable hosts, applications, networks, and services.
07. Privilege Escalation & Lateral Movement
Post exploit actions are performed to gain additional access, penetrate further into the internal environment, escalate privileges, compromise lateral hosts, and harvest additional information.
08. Data Exfiltration
Locating sensitive information, configuration information, and other evidence is gathered to demonstrate impact.
Deliverables For Completed Test
The complete penetration testing results are documented in our content rich report which includes the background, summary of findings, detailed findings, scope and methodology, and supplemental content for context and reference. Samples are available upon request.
An introduction of the general purpose, scope, methodology, and timing of the penetration test.
A brief but concise overview summarizing the results at a glance, such as key critical findings requiring priority attention, system or recurring issues, and other general results.
Comprehensive results of each vulnerability, including a description of the vulnerability observed, the impact, recommendations for remediation, evidence where the vulnerability was observed, step by step demonstrations of exploits performed.
A detailed recap of the specific scope of what was tested, the methodologies utilized, and related historical information necessary for audiences such as auditors to understand the specifics of the test approach.
Additional content and guidance, such as recommended post assessment activities, that provides added value to the audience of the report.