The Internet of Things and IoT devices are promising major technological innovation, as the interconnection of devices and their increasing presence are impacting people's daily lives. However, it is necessary to consider various issues in the development of these devices, starting with the security and privacy they must provide. The ability to make any everyday object smart and connected to the network must come to terms with increased complexity in designing devices and systems that are secure and robust against cyber attacks that have the potential to steal sensitive data and interfere in people's activities. A powerful tool for testing the security of IoT devices is penetration testing: tests, carried out by ethical hackers and professionals, who deliberately look for vulnerabilities and exploit them to demonstrate how much secure the devices are. This succeeds in simulating real attacks that could be carried out by malicious users and finds vulnerabilities that can be fixed in development. This study exemplifies the process of penetration testing an IoT device by performing a Man In The Middle attack and a Distributed Denial of Service attack on the fourth-generation Amazon Echo Dot device, analyzing the results and their possible implications.
L'internet of Things e i dispositivi IoT stanno promettendo un'importante innovazione tecnologica, in quanto l'interconnessione dei dispositivi e la loro crescente presenza stanno impattando la vita quotidiana delle persone. E' però necessario considerare varie tematiche nello sviluppo di questi dispositivi, a partire dalla sicurezza e dalla privacy che devono garantire. La possibilità di rendere qualunque oggetto di uso comune smart e connesso alla rete deve fare i conti con una maggior complessità nel progettare dispositivi e sistemi sicuri e solidi contro attacchi informatici che hanno il potenziale per rubare dati sensibili e interferire nelle attività delle persone. Uno strumento potente per testare la sicurezza dei dispositivi IoT è il penetration testing: dei test, svolti da ethical hackers e professionisti, che deliberatamente cercano vulnerabilità e le sfruttano per dimostrare il grado di sicurezza dei dispositivi. Questo riesce a simulare gli attacchi reali che potrebbero essere eseguiti da utenti malintenzionati e trova vulnerabilità a cui si può porre rimedio in fase di sviluppo. Questo studio esemplifica il processo di penetration testing di un dispositivo IoT attuando un attacco Man In The Middle e un attacco Distributed Denial of Service sul dispositivo Amazon Echo Dot di quarta generazione, analizzando i risultati e le loro possibili implicazioni.
Penetration test di un dispositivo IoT
CASTAGNARO, ALBERTO
2021/2022
Abstract
The Internet of Things and IoT devices are promising major technological innovation, as the interconnection of devices and their increasing presence are impacting people's daily lives. However, it is necessary to consider various issues in the development of these devices, starting with the security and privacy they must provide. The ability to make any everyday object smart and connected to the network must come to terms with increased complexity in designing devices and systems that are secure and robust against cyber attacks that have the potential to steal sensitive data and interfere in people's activities. A powerful tool for testing the security of IoT devices is penetration testing: tests, carried out by ethical hackers and professionals, who deliberately look for vulnerabilities and exploit them to demonstrate how much secure the devices are. This succeeds in simulating real attacks that could be carried out by malicious users and finds vulnerabilities that can be fixed in development. This study exemplifies the process of penetration testing an IoT device by performing a Man In The Middle attack and a Distributed Denial of Service attack on the fourth-generation Amazon Echo Dot device, analyzing the results and their possible implications.File | Dimensione | Formato | |
---|---|---|---|
Castagnaro_Alberto.pdf
accesso aperto
Dimensione
1.75 MB
Formato
Adobe PDF
|
1.75 MB | Adobe PDF | Visualizza/Apri |
The text of this website © Università degli studi di Padova. Full Text are published under a non-exclusive license. Metadata are under a CC0 License
https://hdl.handle.net/20.500.12608/31878