Exploiting an IOT Device
By: Andres D, Steffon R, Juan C, Logan A, Nathan R
Table of Contents
Overview ………………………………..……….
Tools ………………………………………………………….
Project objective …………………………………
Demonstration steps ………………………….
Mitigation tactics ………………………………..
Slide 3
Slide 4-5
Slide 6
Slide 7-21
Slide 23
Overview
In our presentation we will be exploiting a Internet-Of-Things device. The IOT device will be a personal home surveillance ring camera. Ring cams are inexpensive, motion-activated, security cameras designed for easy installation and maintenance. They work through WIFI so you can view them remotely from anywhere from a phone, tablet, or computer. In this demonstration, we will exploit a vulnerability, show you how we’ve gained access of a network, and see it’s content . This was made possible by using the Gitbash terminal and Wireshark. Lastly, we will share our recommendations for mitigating against this type of attack.
Tools
Wireshark
Tools
Gitbash
Project objective
Our goal is to introduce some of the skills we learned at Cybersecurity Bootcamp using tools like Gitbash and Wireshark. Also show the vulnerability of easy access to the security camera, followed up with recommendations.
Hacking a Ring Security Camera step by step instructions and demonstration.
STEP 1: Set a Windows environment variable. To do this, go to your start menu and type “Edit environment variables for your account.” in the search bar. You will then see the following screen.
Persona 01
Step 2:
In the environment variables field option, press new. In the Variable field type SSLKEYLOGFILE. In the Variable field , enter or browse the location of where you store the key log file location. Press OK, then OK again.
Step 3
Next, open up a Gitbash terminal and type the command nano ~/.bashrc
Step 4
This will take you to a script. Once inside, you will need to type, export SSLKEYLOGFILE=~/.ssl-key.log When you have done so, press control + X and then press Y to save the script.
Once you have saved the script, you will need to close the terminal window and open up a new window in the Gitbash Terminal.
Step 5
In the new Gitbash terminal, type echo $SSLKEYLOGFILE. Once you do this, the output should be something similar to the below screenshot
Step 6
Now you will need to check to see if the log populated. In order to see this, you simply need to open a web browser and simply visit any site that has SSL security enabled. Once you have visited the site or sites, check the log file and ensure it looks something like this:
Step 7
Once you’ve confirmed that the logs have generated, be sure to restart any application/browsers that communicate over HTTPS and keep them running in the background. After this is done, open your Wireshark tool and configure per the following:
Edit->Preferences->Protocols->TLS and input the path of the SSLKEYLOGFILE you created earlier in the (PRE)-Master-Secret Log Filename space and press the OK button.
Step 8
While in Wireshark with the packets flowing, filter for HTTP traffic only. You can do this by simply typing http in the filter bar at the top of the screen.
Step 9
At this point, you can either capture current packet or continue to let Wireshark run in the background. Either way, your next step is to right click on a RING camera packet, click Apply as filter option, and hit selected. This will now show you all of the http packets related to the individual cameras on the network we just hacked into.
Step 10
Next you will need to go to File->Export objects->HTTP. This is going to pull in every HTTP related packet that was captured so you will want to click the Content type filter by jpeg option. Once you have the files you want to save, click on them individually and save them to a folder or location that you can come back to later.
NOTE: When saving the files, you will need to add .jpeg at the end of the filename. Otherwise, when you try to open it to view the picture it will not pull up.
Step 11
Lastly, to see the pics from the cameras, simply go to the file location where you saved the packet files and double click the images and they will pull up.
You’ve successfully decrypted http traffic in Wireshark to allow you to view pictures from your home security cameras!!!
MITIGATION TACTICS
protect yourself against attacks
MITIGATION TACTICS
protect yourself against attacks
Summary