<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xml:base="https://blog.avuln.com"  xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
 <title>AVULN Blog - IoT</title>
 <link>https://blog.avuln.com/tags/iot</link>
 <description></description>
 <language>en</language>
<item>
 <title>AVULNATOR prototype in action!</title>
 <link>https://blog.avuln.com/article/3</link>
 <description>&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;&lt;p&gt;Recently, we have presented the first prototype of AVULNATOR ever. The announcement took place at Positive Hack Days conference in Moscow.&lt;/p&gt;
&lt;p&gt;Now it is time to publish a bit more information about the first prototype of AVULNATOR to our blog. Additional bonus here is Proof-of-Concept video at the end of the article.&lt;/p&gt;
&lt;p&gt;Well, there is no doubts that AVULNATOR is a revolutionary device for home network protection and its prototype should has some touchable appearance. Honestly, its first piece has not incredible design and awesome look &lt;span style=&quot;font-family: &#039;Helvetica Neue&#039;, Helvetica, Arial, sans-serif; font-size: 15px; font-style: normal; line-height: 1.625;&quot;&gt;yet&lt;/span&gt;&lt;span style=&quot;font-size: 15px; line-height: 1.625;&quot;&gt;; however, it looks pretty hardcore right now being packed in our handmade case :)&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;img style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; src=&quot;/sites/default/files/files-storage/avulnator_prototype_1.jpg&quot; alt=&quot;&quot; width=&quot;1200&quot; height=&quot;972&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Speaking about functionality of the AVULNATOR, to use its prototype right now you need just to do the following two steps:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;&lt;span style=&quot;font-size: 15px; line-height: 1.625;&quot;&gt;Connect AVULNATOR to your home router (or to ISP cable, in case you do not use your own router)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: 15px; line-height: 1.625;&quot;&gt;Set up your smart electronic devices to be connected to AVULNATOR’s wireless network&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;p&gt;That is all what you need to do. For some smart devices also may be needed to add their models at AVULNATOR’s control panel. Check PoC video at the end of the post to ensure how easy it is.&lt;/p&gt;
&lt;p&gt;Since you connected your devices, AVULNATOR starts to protect them against any possible cyberattacks. According to &lt;strong&gt;OWASP: IoT Security Checklist&lt;/strong&gt; originally contributed by &lt;a href=&quot;https://wallarm.com/&quot;&gt;Wallarm Inc.&lt;/a&gt; experts, AVULNATOR supports all possible threat models considered so far:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;/sites/default/files/files-storage/competitors_ok.PNG&quot; alt=&quot;&quot; width=&quot;1200&quot; height=&quot;577&quot; /&gt;&lt;/p&gt;
&lt;p&gt;It is a very good point. While choosing any sort of protection, one should clearly understand which kind of attacks and threats he is going to mitigate. Protection against highly theoretical threats (like external attack via direct connection to smart electronics) is meaningless, because in more than 99% of cases such attacks are not possible. As a result, there is no reason to pay for this.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;Below is Proof-of-Concept video of how the prototype works. There you can see interface of AVULNATOR&#039;s control panel and demonstration of its protection in action. Initially, protection is turned off (“&lt;em&gt;Security status&lt;/em&gt;” option). Then a public exploit for one of smart devices is used to get root access to the device. Further, we enable security status of AVULNATOR and check exploit again. Enjoy.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;
&lt;iframe src=&quot;https://player.vimeo.com/video/132646597&quot; frameborder=&quot;0&quot; width=&quot;500&quot; height=&quot;313&quot;&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://vimeo.com/132646597&quot;&gt;AVULNATOR: Proof of Concept video&lt;/a&gt; from &lt;a href=&quot;https://vimeo.com/avuln&quot;&gt;AVULN Security Industries&lt;/a&gt; on &lt;a href=&quot;https://vimeo.com&quot;&gt;Vimeo&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-tags field-type-taxonomy-term-reference field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; rel=&quot;dc:subject&quot;&gt;&lt;a href=&quot;/tags/avulnator&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;avulnator&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot; rel=&quot;dc:subject&quot;&gt;&lt;a href=&quot;/tags/internet-things&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;internet of things&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot; rel=&quot;dc:subject&quot;&gt;&lt;a href=&quot;/tags/iot&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;IoT&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot; rel=&quot;dc:subject&quot;&gt;&lt;a href=&quot;/tags/smart-house&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;smart house&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot; rel=&quot;dc:subject&quot;&gt;&lt;a href=&quot;/tags/home&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;home&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot; rel=&quot;dc:subject&quot;&gt;&lt;a href=&quot;/tags/poc&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;PoC&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
 <pubDate>Mon, 06 Jul 2015 11:15:21 +0000</pubDate>
 <dc:creator>Dor1s</dc:creator>
 <guid isPermaLink="false">3 at https://blog.avuln.com</guid>
 <comments>https://blog.avuln.com/article/3#comments</comments>
</item>
<item>
 <title>My home is my castle… or no longer?</title>
 <link>https://blog.avuln.com/article/2</link>
 <description>&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;&lt;p&gt;From ancient times &lt;em&gt;home&lt;/em&gt; is associated with safe and quiet place. Seems like soon it can be changed.&lt;/p&gt;
&lt;p&gt;Recently &lt;em&gt;Forbes&lt;/em&gt; published an article about &lt;a href=&quot;http://www.forbes.com/sites/aarontilley/2015/03/06/nest-thermostat-hack-home-network/&quot;&gt;possible vulnerabilities in Nest Thermostat&lt;/a&gt;. Vulnerability looks unexploitable in practice because physical access to the device is required. However, it is easy to imagine some distributor’s employee or a serviceman getting access to your device and then getting control of it. &lt;/p&gt;
&lt;p&gt;Nest Thermostat is a great device and now treated as one of the most secure, according to Forbes. The same thing cannot be said about other “Internet of Things” stuff:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://threatpost.com/researcher-discloses-wi-fi-thermostat-vulnerabilities/108434&quot;&gt;https://threatpost.com/researcher-discloses-wi-fi-thermostat-vulnerabilities/108434&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.securityfocus.com/archive/1/534774&quot;&gt;http://www.securityfocus.com/archive/1/534774&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.cheatsheet.com/technology/usb-drive-to-smart-home-which-of-your-devices-can-be-hacked.html/?a=viewall&quot;&gt;http://www.cheatsheet.com/technology/usb-drive-to-smart-home-which-of-your-devices-can-be-hacked.html/?a=viewall&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;and so on&lt;/li&gt;
&lt;/ul&gt;&lt;p&gt;&lt;em&gt;IoT&lt;/em&gt;-era is only raising now. Importance of information security acknowledged now better than ever. Despite that, between comfort and security, we always prefer comfort. Usually comfort has nothing in common with security. It is why creating incredible and high-quality products is so difficult and require many resources for vendors.&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot;&gt;Currently serious cybersecurity threats for our homes are related not only with innovative devices. Most of all widely spread routers for home    &lt;a href=&quot;http://www.cvedetails.com/vendor/899/D-link.html&quot;&gt;have&lt;/a&gt;    &lt;a href=&quot;http://www.cvedetails.com/vendor/1414/Utstarcom.html&quot;&gt;so&lt;/a&gt;    &lt;a href=&quot;http://www.cvedetails.com/vendor/3447/Asus.html&quot;&gt;many&lt;/a&gt;    &lt;a href=&quot;http://www.cvedetails.com/vendor/1369/Belkin.html&quot;&gt;different&lt;/a&gt;    &lt;a href=&quot;http://www.cvedetails.com/vendor/859/Zyxel.html&quot;&gt;vulnerabilities&lt;/a&gt;.    &lt;a href=&quot;http://www.cvedetails.com/vendor/11936/Tp-link.html&quot;&gt;Yeah&lt;/a&gt;.    Hackers exploit such security holes, as &lt;a href=&quot;http://krebsonsecurity.com/2015/02/spam-uses-default-passwords-to-hack-routers/&quot;&gt;KrebsOnSecurity reports&lt;/a&gt;, and &lt;a href=&quot;https://threatpost.com/lizard-squads-ddos-for-hire-service-built-on-hacked-home-routers/110341&quot;&gt;do it very successful&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;An attacker controlling your router may control all your traffic. Such evil thing affects not only your privacy, but also makes another threats become actual. Sure, you have already heard about &lt;em&gt;HTTPS&lt;/em&gt; (HTTP over SSL/TLS) which made to protect traffic against eavesdropping. News, especially recent news reveal that it is not perfect at all: &lt;a href=&quot;http://heartbleed.com/&quot;&gt;Heartbleed&lt;/a&gt;, &lt;a href=&quot;http://poodlebleed.com/&quot;&gt;POODLE&lt;/a&gt;, &lt;a href=&quot;https://freakattack.com/&quot;&gt;FREAK&lt;/a&gt;, what’s next? Also &lt;a href=&quot;http://thehackernews.com/2015/02/lenovo-superfish-malware.html&quot;&gt;some vendors give good opportunities to hack their customers&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Vulnerabilities in home routers along with software holes in endpoint devices make very easy to steal your money from online-banking or your private photos from cloud storage.&lt;/p&gt;
&lt;p&gt;If somebody is not sure of the possibility of practical implementation of such threats, &lt;a href=&quot;https://ctfcrew.org/writeup/97&quot;&gt;this write-up&lt;/a&gt;, for example, may serve as a proof of concept. It is not a hacking tutorial; it is just solution of one task from a hacking contest. But it really shows step-by-step how to realize attack very similar to the one described above.&lt;/p&gt;
&lt;p&gt;May be it looks hard for a normal user, but actually it is very easy to implement.&lt;/p&gt;
&lt;p&gt;Hackers are thieves. Default-password is like an opened door to your home. Out-of-date software is like an opened window.&lt;/p&gt;
&lt;p&gt;Should we be scared? No. We must be extremely attentive now to prevent our families and folks from trouble. It really matters. We should carefully use opportunities of modern technologies and fully understand (when it’s possible) what we do each time using the Internet.&lt;/p&gt;
&lt;p&gt;To help you with that, we at &lt;em&gt;AVULN Security Industries&lt;/em&gt; are developing &lt;a href=&quot;https://avuln.com/forhome&quot;&gt;AVULNATOR&lt;/a&gt;. The device that will block malicious traffic incoming to your home network and other malware activity. AVULNATOR will be always up-to-dated because of our distributed cloud-based monitoring system. Read more at our &lt;a href=&quot;https://avuln.com/forhome&quot;&gt;AVULNATOR&lt;/a&gt; page.&lt;/p&gt;
&lt;p&gt;&lt;img style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; src=&quot;/sites/default/files/files-storage/protect.png&quot; alt=&quot;&quot; width=&quot;300&quot; height=&quot;300&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Pre-oder does not require payment, but gives your 10% off discount.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Placing pre-order now, you help us make AVULNATOR cheaper.&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-tags field-type-taxonomy-term-reference field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; rel=&quot;dc:subject&quot;&gt;&lt;a href=&quot;/tags/avulnator&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;avulnator&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot; rel=&quot;dc:subject&quot;&gt;&lt;a href=&quot;/tags/internet-things&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;internet of things&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot; rel=&quot;dc:subject&quot;&gt;&lt;a href=&quot;/tags/iot&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;IoT&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot; rel=&quot;dc:subject&quot;&gt;&lt;a href=&quot;/tags/smart-house&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;smart house&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot; rel=&quot;dc:subject&quot;&gt;&lt;a href=&quot;/tags/home&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;home&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
 <pubDate>Thu, 12 Mar 2015 12:21:43 +0000</pubDate>
 <dc:creator>Dor1s</dc:creator>
 <guid isPermaLink="false">2 at https://blog.avuln.com</guid>
 <comments>https://blog.avuln.com/article/2#comments</comments>
</item>
</channel>
</rss>
