Penetesting Industry 4.0 IoT Prototype – 4

Must have security measures for Industry 4.0 Firmware integrity and secure boot: Secure boot uses cryptographic code signing techniques, assures that a device only executes code generated by the device OEM or another trusted party. Use of protected boot technology restricts hackers from changing firmware with malicious instruction sets, thereby avoiding attacks. Unfortunately, not all…

Penetesting Industry 4.0 IoT Prototype – 3

Step 3: Hosting the payload on a Website To host the payload, we use the inbuilt apache server. Replacing the default “index.html” file with the generated payload file saved in “/var/www/html” folder is essential. We use the command shown in Fig 10 to host a page as shown in Fig 11. Fig 10: Start an…

Penetesting Industry 4.0 IoT Prototype – 2

Remotely Hacking into Raspberry Pi Step 1: Creating a TCP Tunnel The first step to hack into any device on a different network is to create a TCP tunnel. This can be done using a freely available application called ‘ngrok’. Open https://ngrok.com/download in browser and login/signup (Refer Fig 3). Fig 3: ngrok website Then download…

Penetesting Industry 4.0 IoT Prototype – 1

Penetesting Industry 4.0 IoT Prototype Why we did this? Valency Networks is established into VAPT market but walking path of making IoT based industries secure. There is a great deal of confusions around IoT and Industry 4.0, in terms of how those interact, what are their security challenges, what methods need to be followed etc.…

Considering ISO27001 for IoT Security Readiness

Manufacturing companies are heading towards IoT (Internet of Things) in a fast pace. While most of the companies are focused on automating their production processes, they seems to be losing focus from one key element – information security. This article briefs about typical challenges in IoT Security Readiness and how ISO27001 can help in the…

IOT Vulnerability Assessment using Raspberry Pi2

IOT Vulnerability Assessment and Penetration Testing IOT, which is a buzzword in many business industries and also its becoming one of the most important trend in the history of the software industry. IoT are physical objects that connect wirelessly to a network and has the ability to transmit data they are equipped with the sensors…

Basics Of IoT Security Threat Modelling

⦁ Basic of IoT Security Threat Modelling The Internet of Things or IoT as we call it can be treated as to be interrupting the interruption. IoT where all the non humans are both clients as well as servers is said to be on the edge of widely interrupting the most famous, Internet. There was…