Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • Hacking Christmas Gifts: Putting IoT Under the Microscope
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Hacking Christmas Gifts: Putting IoT Under the Microscope

5 years ago Craig Young
Hacking Christmas Gifts: Putting IoT Under the Microscope

If high-tech gadgets are on your holiday shopping list, it is worth taking a moment to think about the particular risks they may bring. Under the wrong circumstances, even an innocuous gift may introduce unexpected vulnerabilities. In this blog series, VERT will be looking at some of the Internet’s best-selling holiday gifts with an eye toward their possible security implications. Some of the risks discussed in this series may be over the top and even comical while others may highlight realistic problems you may not have considered.

Looking at a WIFI Microscope kit

In this first installment of the series, I’ll be discussing a WiFi microscope kit. There are, without exaggeration, dozens of listings for these devices on Amazon and most of them appear to be the same or very similar hardware with different brandings and varying accessories. Being the science geeks that we are, our team was quick to buy one of these devices when we saw it listed as a top-seller on Amazon’s holiday gift guide.

The microscope itself is compact with a wheel to adjust the lens and a few buttons for power, digital zoom, and to trigger image capture. It is necessary to connect a computer or smartphone to view and store images. From the quick start guide, Android and iOS devices can obtain a viewer app called “Max See” from their respective stores, macOS users can connect via USB and launch Photo Booth, but Windows users are directed to download a program for accessing the camera via USB or IP.

Reviewing the Security Implications

The question of whether additional software must be installed to utilize a device is an important question from the perspective of security. Installing software on a system generally widens the attack surface and, from a purely security perspective, should be avoided when possible.

In this metric, the fact that macOS can access the camera without additional software is preferable. For a Windows user, however, there is risk even before the software is installed because the instructions do not specify to use an HTTPS connection when downloading the camera software making it possible that an attacker on the network could replace the downloaded program with malware. Assuming an authentic program is downloaded, however, the risk of using this program to access the microscope via USB should be minimal.

With the Android and iOS use case, the attack surface is somewhat different due to the WiFi connection. The microscope works by acting as a wireless access point without a password and having the mobile device connect with the vendor’s app. This may mean that the phone or tablet remains in an insecure configuration where it may automatically and unexpectedly connect to an attacker’s access point in the future. This also means that a nearby attacker can inject malicious messages or completely spoof the microscope. An attacker who is nearby when the microscope is in use could likely deauthenticate the victim from the legitimate microscope and then produce a new access point impersonating the camera but sending malicious responses.

Multimedia and network protocol decoders are historically a common source for memory corruption flaws but these risks can be largely minimized by using well-tested platform libraries. In this case, however, extracting the contents of the Android application reveals a 7MB .so file which is responsible for handling device communications. A cursory static analysis of this binary reveals that it contains functionality for parsing RTP responses and MJPEG data. I didn’t spend the time to analyze this file and find concrete examples of vulnerability, but I have no doubt that there is something to be found.

In a worst-case scenario, an attacker could develop an exploit to achieve code execution on a nearby phone or tablet using one of these microscopes. Arbitrary code execution in the context of this Android application would allow the attacker to access the victim’s photos and whatever other messages are stored locally on the device.

Building Gadgets with Security in Mind

The chance that anyone cares enough to develop an exploit for this platform are slim and the chances that you yourself may be targeted by such an exploit are even slimmer. My point with this post is not to claim the sky is falling or argue against buying fun gadgets but rather to give an example of how to evaluate some less obvious risks from a given technology. This is an important perspective to maintain as we build and improve upon the systems we use every day.

As a developer or a vulnerability researcher, a main take away from this example is how the decision to create a custom parsing implementation rather than using system parsers can introduce vulnerabilities and create an excessive degree of overhead to maintain.

The post ” Hacking Christmas Gifts: Putting IoT Under the Microscope” appeared first on TripWire

Source:TripWire – Craig Young

Tags: Android, Encryption, Exploit, High Severity, TripWire, Zoom

Continue Reading

Previous Configuración segura en la nube – Explicación de IaaS, PaaS y SaaS
Next Back-to-Work Phishing Campaign Targeting Corporate Email Accounts

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Microsoft’s MDASH AI System Finds 16 Windows Flaws Fixed in Patch Tuesday

4 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Azerbaijani Energy Firm Hit by Repeated Microsoft Exchange Exploitation

4 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

[Webinar] Why Your AppSec Tools Miss the “Lethal Path” (and How to Fix It)

5 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Most Remediation Programs Never Confirm the Fix Actually Worked

6 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Microsoft Patches 138 Vulnerabilities, Including DNS and Netlogon RCE Flaws

7 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

GemStuffer Abuses 150+ RubyGems to Exfiltrate Scraped U.K. Council Portal Data

9 hours ago [email protected] (The Hacker News)

Recent Posts

  • Microsoft’s MDASH AI System Finds 16 Windows Flaws Fixed in Patch Tuesday
  • Azerbaijani Energy Firm Hit by Repeated Microsoft Exchange Exploitation
  • [Webinar] Why Your AppSec Tools Miss the “Lethal Path” (and How to Fix It)
  • Most Remediation Programs Never Confirm the Fix Actually Worked
  • Microsoft Patches 138 Vulnerabilities, Including DNS and Netlogon RCE Flaws

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT