QASource Newsletter

QASource Blog ShieldCast - Winter 2018

ShieldCast - Winter 2018

IoT Security Testing Services

1
Threat Modeling
Develop comprehensive threat models of entire IoT system that can evolve and live with complete product lifecycle.
2
Device Design
Ensure hardware issues don’t become the loopholes of your software security architecture.
3
IoT Penetration Testing
Perform penetration testing of IoT mobile application, cloud APIs, communication protocols, and embedded hardware and firmware or any other segment that comprises complete IoT system.
4
Hardware Testing
Analyze the physical security and internal architecture of the device. Perform tests to bypass authentication, intercept traffic, inject commands by reconfiguring devices hardware.
5
Protocol Testing
Examine the security of communication protocols. Tests may examining the cryptographic security of encrypted transmissions, capture and modify transmitted data, and communication protocol fuzzing.
6
Firmware Testing
Extract and analyze the content of the firmware. Attempt to discover backdoor accounts, buffer overflows, format strings, injection flaws, and other common vulnerabilities.

Threat Exposure

SQL Injection

SQL Injection (SQLi) is one of the oldest, most prevalent and most dangerous vulnerability. In this type of injection attack, attacker executes malicious SQL statements through web forms that control a web application’s database server.

SQL Injection

Impact

  • Access sensitive data from application database
  • Can insert, update or remove data from database
  • Attacker can execute database administration operation which can lead to shutdown of DBMS
  • Opens access to DBMS file system which can result in sharing of sensitive information
  • In severe cases, it can open access to operating system commands

Testing Recommendations

  • Test by inputting special characters like -- (double-hyphen), ; (semicolon), ‘ (single quote), “ (double quote) and other similar characters of special meaning in different flavors of SQL
  • Append universally true expressions like 2>1, at the end of all valid input fields using different expressions coupled with a variety of SQL keywords like AND, OR, UNION etc, to simulate an attack

Useful Tools

  • Sqlmap
  • SQLi Dumper

Evaluation – Tools and Technologies

BLACKARCH LINUX

BlackArch Linux is an Arch Linux-based penetration testing distribution for penetration testers and security researchers.

Features
  • Derived from ArchLinux
  • Can install BlackArch components individually or in groups
  • Offers over 1900 tools organized by category, for security, and forensic
  • Can be used as a standalone live CD or live USB, run from a virtual machine, or be installed to a computer's hard disk
BlackArch Tools
Key Takeaway

AIEngine - AIEngine is the next generation network intrusion detection engine. This interactive packet inspection engine offers features such as DNS domain classification, spam detection, network collector, network forensics, and many others. What’s more interesting about AIEngine is that it has the ability to learn without any human intervention.

Suggestions

Suggestions?

We would love to hear your feedback, questions, comments and suggestions. This will help us to make us better and more useful next time.
Share your thoughts and ideas at knowledgecenter@qasource.com

Disclaimer

The logos used in this post are owned by the individual companies of each logo or trademark. The logo is not authorized by, sponsored by, or associated with the trademark owner, but QASource is using the logos only for reviewing purposes. The endorsement of the used logos by QASource is neither intended nor implied.