Dr. Antje Winkler
IoT & Embedded Penetration Testing
IoT & Embedded Penetration Testing
With our expertise, we help you thoroughly examine your embedded devices and identify potential vulnerabilities. Our comprehensive services allow us to assess individual IoT devices and conduct a holistic evaluation of your entire IoT ecosystem.
Many IoT devices allow users to input data or retrieve information through mechanisms such as touchscreens, microphones or cameras. Hidden areas for system configuration or updates may expose sensitive information or allow for device manipulation by attackers.
As part of the IoT penetration test, we:
To connect IoT devices with each other, appropriate network interfaces are required. Wireless standards provide flexible and scalable setups. However, wireless connections can pose significant security risks. The extended range and flexibility of wireless communication make it easier for potential attackers to intercept communication, manipulate data or remotely connect to the devices.
Our state-of-the-art IoT test lab is equipped to thoroughly examine your devices and identify vulnerabilities in the following wireless interfaces:
In addition to wireless interfaces, wired connections are often used, especially when real-time communication is required. Since these interfaces are often accessible without manipulation of the device, they are of particular interest to attackers.
Our team of experts will analyze:
Embedded devices feature various interfaces and bus systems, used both for internal data transfer between microprocessors and memory modules as well as for error analysis or firmware updates.
Using state-of-the-art laboratory equipment, our experts analyze your IoT devices down to the circuit board and examine:
The firmware of an IoT device governs its behavior, such as processing of sensor and various other inputs, or storing data in memory. Firmware files often contain sensitive information and manufacturer’s intellectual property. Functional and security updates can be carried out through various methods, such as:
As part of our IoT penetration testing, we offer the following services:
The connectivity of IoT devices is facilitated through various protocols, such as those used for exchange of operational and telemetry data, to perform maintenance and diagnostics or to enable remote management. If secure transmission channels are not employed for these connections, attackers may intercept or alter data, or impersonate communication partners, thereby manipulating the communication flow (known as man-in-the-middle attacks).
To ensure a comprehensive approach, we not only examine the components and interfaces of your device but also assess:
The penetration testing process of BDO Cyber Security GmbH is based on the five-step approach defined in “Study A Penetration Testing Model”, published by the German Federal Office for Information Security (BSI) and was tailored to the specific requirements of testing within IoT and embedded environments:
During the first phase of the penetration test, test objectives as well as organizational, technical and legal aspects are coordinated with the client. This involves collecting key device data and reviewing architecture diagrams of the IoT ecosystem, along with technical specifications of the device and interfaces, and, where applicable, circuit and block diagrams. Based on this information, the components and functions to be tested, as well as the testing approach, are coordinated with the client.
The results of this phase are documented in a contract, which serves as the legal basis for the penetration testing engagement.
In phase 2, the information and documents provided by the customer are examined in detail.
Additionally, in this phase, the initial test setup is carried out. The testing team prepares the device to be tested, along with any necessary peripherals, simulators and test equipment. This also includes testing any provided software, login credentials and files such as update packages.
Based on the information gathered during previous phases, the list of planned test cases - and therefore the time required - can be adjusted for selected components according to their relevance. This involves identifying, analyzing, and prioritizing potential threats and attack vectors (e.g., based on damage potential, likelihood of success and possible impacts).
Following the initial analyses, active intrusion attempts are conducted. For this purpose, selected test cases for each device component in scope will be executed.
The tests are conducted in a state-of-the-art test lab using specialized equipment tailored to the specific technologies.
If a test case reveals a (potential) vulnerability, its exploitability and impact are examined:
Furthermore, evidence is gathered for each vulnerability, such as screenshots or step-by-step instructions to reproduce the attack or provoke specific system behaviors.
All tests are mainly carried out manually.
The penetration test is concluded with the Final Analysis and Clean-Up Phase. During the final analysis, all results from the previous phases are compiled into a detailed report, including:
If necessary, remnants of the test activities are also removed in this phase.
In the context of IoT penetration tests, test cases are selected and executed based on testing guidelines. While the BSI model for penetration tests categorizes test cases into modules for information gathering (I-Modules) and intrusion attempts (E-Modules), BDO Cyber Security GmbH employs its own framework. The primary reason for this is that the I- and E-Modules can only be applied to embedded devices to a limited extent.
BDO Cyber Security GmbH's framework is based on recognized, current standards. The testing methodology for IoT and embedded penetration testing is based, among other sources, on the OWASP IoT Security Testing Guide (ISTG). In addition, BDO Cyber Security GmbH has developed its own catalog with detailed test cases for individual technologies and standards. This catalog is based on current recommendations and best practices for the respective technologies and is constantly being developed further, taking new security vulnerabilities into account.