loading

Reverse-Engineering Suspicious IoT Devices Installed Under Employee Desks

What would you do if you found a suspicious-looking IoT (Internet of Things) device under your desk at work? If youre an employer, how do you install innocuous IoT devices in your office building with raising concerns from your employees? If you want to produce your own IoT devices, how do you ensure that theyre ethical, legal, and secure?

Reverse-Engineering Suspicious IoT Devices Installed Under Employee Desks 1

Erich Styger answers all of those questions in a log of his journey through reverse-engineering an IoT device found in a real office.For ethical and probably legal reasons, Styger doesnt say where exactly this device was found, nor who designed or manufactured it. He was been in contact with the manufacturer to let them know about the flaws he found, but his post is mostly intended for educational purposes.

These particular devices were found mounted throughout a work space, including under employees desks. Each IoT device was mounted magnetically and easily removed, but their purpose wasnt clear. That, in itself, is the first red flag.

Employers should never install monitoring equipment without their employees knowledge. Most of the rest of the red flags deal with the security of the hardware, which was full of vulnerabilities. Inside the easily-opened case was a PCB with a LoRa module and antenna, an STM32 Arm Cortex-M0 microcontroller, a humidity/temperature sensor, a PID motion sensor, and an accelerometer that was apparently left unconnected.

As it turns out, the device was intended to simply monitor the environmental conditions through the office, and was triggered by motion via the PID sensor in order to save battery life. However, Styger found multiple ways to intercept that data, and even methods to inject false data. The easiest way to gather the data, and more importantly the secret app key, was to simply pick it up when it was transmitted between the microcontroller and LoRa module, because it was sent as clear text.

Reverse-Engineering Suspicious IoT Devices Installed Under Employee Desks 2

With that information, the device could be spoofed through the LoRaWAN network. The debug pins and functions were even left accessible, so the devices firmware could be copied, reverse-engineered, and modified. Basically, if youre looking for a thorough explanation of what not to do when designing an IoT device that should be secure, Stygers blog post is perfect RELATED QUESTION I didn't get Google Glass Explorer Edition.

Is trying to learn Glass dev without the hardware a futile effort? No, you can still learn the fundamentals of Glass development without the hardware. There are three main approaches for accomplishing this: 1) Visit the Mirror API documentation, get into the playground, and start hashing up some code.

Download the PHP, Java, and Python library, whichever you're most comfortable with. Familiarize yourself with the jargon and converntions (timeline, bundles, menus, etc). Read the support documentation (second link below) to see how the Glass hardware actually functions.

Build some apps to this specification. Soon enough, you will find a friend with hardware to t

GET IN TOUCH WITH Us
recommended articles
Cases
Retail has never been a stagnant industry. Retailers just can not afford to stand still if they want to succeed. They must adapt and innovate or risk being left behi...
canon hack development kit is a unique software application that enables extra features for ported Canon Point&Shoot cameras.Why CHDK?After loading CHDK, your ca...
A common business practice for companies with questionable ethics is to sell you a product at a reasonable price, and then charge you inflated prices for the require...
Mr David CAMERON, UK Prime Minister. Date:18/3/2016. Location: Brussels / European Union / Source: TV Newsroom European CouncilMarkit released yesterday its Chartere...
Reverse car parking is one of the hardest parts for drivers to park a car. Despite that, it becomes quite tough for a driver to see the small living thing while park...
Lavoro da sei mesi nei palazzi di Governo, come data scientist nella Commissione dInchiesta sulla Digitalizzazione e lInnovazione della Pubblica Amministrazione.Il s...
no data
Shenzhen Tiger Wong Technology Co., Ltd is the leading access control solution provider for vehicle intelligent parking system, license plate recognition system, pedestrian access control turnstile, face recognition terminals and LPR parking solutions.
no data
CONTACT US

Shenzhen TigerWong Technology Co.,Ltd

Tel: +86 13717037584

E-Mail: info@sztigerwong.com

Add: 1st Floor, Building A2, Silicon Valley Power Digital Industrial Park, No. 22 Dafu Road, Guanlan Street, Longhua District,

Shenzhen,GuangDong Province,China  

                    

Copyright © 2024 Shenzhen TigerWong Technology Co.,Ltd  | Sitemap
Contact us
skype
whatsapp
messenger
contact customer service
Contact us
skype
whatsapp
messenger
cancel
Customer service
detect