OWASP Top 10 Part 1

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
8 hours 10 minutes
Difficulty
Advanced
CEU/CPE
8
Video Transcription
00:00
Hi, I'm Matthew Clark and this is less than 1.50 wasp I o t Top 10, part one.
00:08
In this lesson, we're going to discuss the first five of the O Wasp Coyote Top 10. This includes week decibel or hard coded passwords, insecure network services, insecure ecosystem interfaces,
00:23
lack of secure update mechanism
00:26
and use of insecure or outdated components. So let's get started.
00:32
So here it is. The old WASP Coyote Top 10 list.
00:36
The 2018 edition, which is the most current at this time.
00:40
The WASP Coyote Top 10 list comprises the top 10 things that you should avoid at all cost. It's a list of weaknesses, and if it's on this list, then it's a pretty good reason for it.
00:53
Daniel Mesler is on the team that developed to put together Theo Wasp Coyote Top 10. He gave a talk in October 2018. The link is in the reference materials in which he spoke about the methodology of how this list was put together.
01:07
They looked at a lot of different databases, such as M V D bug crowd, VRT and other sources, as well as I ot projects such as the C s a nest insa,
01:19
and they took that data set and normalized and sort of it
01:23
to find the most common problems affecting I o T. Security. So let's start with number one
01:30
So number one week decibel or hard coded passwords. This includes consumer issues such as weak passwords, either password on the top password lists, or guess able passwords such a czar, last name or reuse of existing passwords across different accounts
01:47
for the O. A. M. It could be hard coded passwords and you see this a lot and legacy i o T devices
01:53
credentials could be located on a public repo in documentation or something you could easily Google.
02:00
And that password is reused. You know, that's just not common among just consumers
02:04
or the OM could forget Thio, disable a backdoor or include a back door and credentials event are used to access the device
02:13
and California i o T Law. It attempts to address this a little bit where you can discuss that more module seven
02:21
but passwords. One thing to remember. Passwords are an input for botnets. 2020 risen Data breach investigations report found that 80% of hacking related breaches are still tied. Passwords
02:35
number two is insecure network services.
02:38
This includes vulnerable services that could be used on the device or throughout the ecosystem,
02:44
which in turn could lead to compromise.
02:46
Insecure services could be Tell Net or http or ssh,
02:53
it could be services. They're just left running on the device. You don't necessarily need to be or open Damien's that air. Just listening for connection.
03:02
It could be the aims that failed a lock down ports on the device OS.
03:07
I think about 1st, 2nd what you could find and showed in, And that should help give you an example of kind of what this is talking about
03:14
again. Don't feed the bottom. That
03:15
an example that combines 1st and 2nd entries on the top 10 list is the Mirai botnet.
03:23
It is peak in 2016. It had consumed over 600,000 coyote devices,
03:29
and it did this by discovering open till net ports and then brute, forcing the log in and generally doing bad stuff from there.
03:38
Number three is insecure ecosystem interfaces.
03:42
Now for number three. It's all the common ways that you would get into an I O. T. System or or ecosystem
03:50
for the 2018 top 10 list. They combine a couple different things from the 2014 top 10 list to come up with this new entry.
03:59
They combine the insecure Web AP Ice and interfaces along with insecure backhand. AP Ice Cloud, AP Ice and Mobile AP Ice.
04:08
Now, for this particular 11 of the things to be sure of is to make sure that your application code and your websites are not vulnerable to common things such as SQL Injection cross site scripting a cross site request forgery,
04:23
the Palo Alto 2020 Unit 42 i o T Threat Report. That's a mouthful.
04:30
But this report found that 72% of healthcare V lands mixed there I o. T. And I t assets together, making it possible for malware to spread from the computers to vulnerable i o T devices.
04:46
The 2018 net Scout Threat Intelligence report found something really interesting. They found that the average time it took for a I ot device to be attacked
04:56
once it was connected to the Internet was only five minutes.
05:00
Think about that.
05:03
Number four is a lack of secure update mechanism
05:06
in less than 1.2. We mentioned that 57% of all I o T devices were vulnerable to medium and high severity attacks.
05:16
So lacking a patching process remains a major factor
05:21
for old vulnerabilities as well as credential attacks using known passwords.
05:28
Number four only OAS coyote Top 10 includes ah lack of authentication for updates
05:32
which could introduce rogue devices into the ecosystem
05:36
or could be leveraged for attacks on other legitimate ISIS
05:42
or could. It also includes a lack of authentication, which could lead to malicious updates
05:46
and also related to this is attacking the update process itself, or supply chain attack,
05:54
where malicious updates are injected into a trusted channel.
05:58
The C C cleaner attack is a well known example of this
06:01
threat. Actors can target specific regions or industries. An example is Petra or not, Pitta attacks
06:09
when third actors can target isolated environments like industrial O. T or I. C s.
06:15
Number four also includes a lack of secure delivery, such as sending the update in clear text or not signing the update.
06:24
It also includes a lack of firmware validation. How do you know that the firmware is valid and proper
06:30
conditions where the security of date changes. User preference is also an issue where the update rolls back, the security settings back to default or worse, the customers not notified of the change.
06:45
Also including this is the lack of anti roll back for security patches. And maybe that's a design decision. But the customer would need to know that
06:56
Number five is the use of insecure or outdated components.
07:00
This includes both vulnerable services and vulnerable interfaces, both of which we've already discussed.
07:06
It also includes insecure components found within the supply chain,
07:12
which could be depreciated, libraries, software or re use of insecure components.
07:17
It could also be re use of compromise components.
07:21
Did you know that two years after the Equifax breach, the 65 of the Fortune 100 companies downloaded the same vulnerable version of Apache struts that was used in that reach? I still wonder why,
07:35
Okay,
07:38
so this one also includes insecure code or components and board support packages or software development kits, which are used in the attitude hardware development process.
07:47
We have a case study about urgent 11 that will look at a module four that will kind of cover them
07:54
and also includes altering the OS of this insecure or using a vulnerable operating system to begin with
08:01
the four Scout 2020 Enterprise of Things security report. I have no idea why these threat reports have such long titles, but they dio. But anyways, this particular third report
08:13
found that embedded when 27 unsupported version represents
08:18
a major risk. It's used in 30% of managed devices in manufacturing and 35% of devices and health care.
08:30
In this lesson, we discussed five of the WASP I O T Top 10,
08:35
which includes the week ungettable or hard coded passwords,
08:39
insecure network services,
08:41
insecure ecosystem interfaces,
08:45
lack of secure update mechanisms and use of insecure or outdated components.
08:52
Join me for the next lesson where we'll continue our discussion.
Up Next
IoT Product Security

This course will focus on the fundamentals of how to set up a functioning IoT product security program from the perspective of a company that designs, manufactures, and sells IoT and IIoT devices for consumer or industrial use.

Instructed By