IoT Scanning Inspection Service

Correspond to OWASP IoT Top 10 testing items (2018 version)

Key Wisdom provides scanning service of IoT (Internet of Things) and focuses on vulnerability assessment and penetration testing, which corresponds to OWASP IoT Top 10 vulnerability types (2018 version). With OWASP IoT Top 10 vulnerability types completely corresponding with all relevant vulnerabilities, we are able to perform vulnerability assessment efficiently and accurately via VA tools. Along with our Key Reporter (VA management system), assessment reports can be automatically generated, which saves IT staff lots of time and effort and therefore enables them to fix the vulnerabilities in time.

Testing items

1.

  • Weak, Guessable, or Hardcoded passwords:

  • Use of easily bruteforced, publicly available, or unchangeable credentials, including backdoors in firmware or client software that grants unauthorized access to deployed systems.

2.

  • Insecure Network Services:

  • Unneeded or insecure network services running on the device itself, especially those exposed to the internet, that compromise the confidentiality, integrity/authenticity, or availability of information or allow unauthorized remote control.

3.

  • Insecure Ecosystem Interfaces:

  • Insecure web, backend API, cloud, or mobile interfaces in the ecosystem outside of the device that allows compromise of the device or its related components. Common issues include a lack of authentication/authorization, lacking or weak encryption, and a lack of input and output filtering.

4.

  • Lack of Secure Update Mechanism:

  • Lack of ability to securely update the device. This includes lack of firmware validation on device, lack of secure delivery (un-encrypted in transit), lack of anti-rollback mechanisms, and lack of notifications of security changes due to updates.

5.

  • Use of Insecure or Outdated Components:

  • Use of deprecated or insecure software components/libraries that could allow the device to be compromised. This includes insecure customization of operating system platforms, and the use of third-party software or hardware components from a compromised supply chain.

6.

  • Insufficient Privacy Protection:

  • User’s personal information stored on the device or in the ecosystem that is used insecurely, improperly, or without permission.

7.

  • Insecure Data Transfer and Storage:

  • Lack of encryption or access control of sensitive data anywhere within the ecosystem, including at rest, in transit, or during processing.

8.

  • Lack of Device Management:

  • Lack of security support on devices deployed in production, including asset management, update management, secure decommissioning, systems monitoring, and response capabilities.

9.

  • Insecure Default Settings:

  • Devices or systems shipped with insecure default settings or lack the ability to make the system more secure by restricting operators from modifying configurations.

10.

  • Lack of Physical Hardening:

  • Lack of physical hardening measure, allowing potential attackers to gain sensitive information that can help in a future remote attack or take local control of the device.

Service process

Confirmation in advance

  1. check system, network and frame
  2. check asset information and the content of reports
  3. confirm the target IoT devices

Adjusting Scanning Policy

Check whether there is any to change, eliminate or update

Executing the scanning process

  1. Adjust the process at any time
  2. Export the scanning result

Automatically generating reports

Through Key-Reporter, reports can be automatically generated

Analyzing the scanning result

  1. Set the acceptance risk
  2. Eliminate misjudgment

Assisting our clients in fixing vulnerabilities

We provide both virtual and physical consultation service.

TOP