1395  IoT Security Practice Exercises

1395.1 Practice Exercises

Apply your knowledge of IoT threats and vulnerabilities with these hands-on exercises.

Objective: Learn to identify threat actors, understand their motivations, and design appropriate defenses for different attacker profiles.

Scenario: Youโ€™re deploying a smart building system with 500 IoT devices controlling HVAC, lighting, and access control.

Tasks:

  1. Identify potential threat actors for this deployment using the threat actor classification (script kiddies, cybercriminals, hacktivists, insiders, nation-states)
  2. Analyze capabilities and motivations: For each threat actor, determine what they might target and why
  3. Map attack vectors: Identify which attack vectors each threat actor would likely use (network, physical, web/API, firmware, side-channel)
  4. Design layered defenses: Create a defense strategy that addresses the top 3 most likely threat actors

Expected Outcome: A threat assessment document identifying:

  • 3-5 relevant threat actors with capability scores (1-5)
  • Attack scenarios for each actor
  • Prioritized mitigation controls (e.g., โ€œDeploy network segmentation to prevent lateral movement from compromised HVAC controller to access control systemโ€)

Practical Application: Understanding threat actors helps you allocate security budget appropriatelyโ€”defending against nation-states requires different investments than defending against script kiddies.

Objective: Apply the STRIDE framework to systematically identify threats in an IoT system.

Scenario: Smart door lock system with: mobile app -> cloud API -> Wi-Fi router -> smart lock device

Tasks:

  1. Draw a data flow diagram showing all components and communication paths
  2. Apply STRIDE to each component:
    • Spoofing: Can attacker impersonate mobile app, cloud server, or lock?
    • Tampering: Can unlock commands, firmware, or stored keys be modified?
    • Repudiation: Can users deny unlocking the door? Is there an audit trail?
    • Information Disclosure: Can unlock codes, Wi-Fi credentials, or user data leak?
    • Denial of Service: Can attacker prevent legitimate users from unlocking?
    • Elevation of Privilege: Can guest user gain admin access?
  3. Document 10+ threats (at least one per STRIDE category plus duplicates)
  4. Prioritize using DREAD (Damage, Reproducibility, Exploitability, Affected users, Discoverability)
  5. Recommend mitigations for the top 5 highest-risk threats

Expected Outcome: Threat model document with:

  • Data flow diagram
  • Threat table with STRIDE category, description, DREAD score, and mitigation
  • Top 5 priority threats with detailed mitigation plans

Example Threat:

  • Category: Tampering (Replay Attack)
  • Description: Attacker captures โ€œunlockโ€ Wi-Fi command and replays it 3 hours later
  • DREAD Score: 8/10 (High damage, easy reproducibility, medium exploitability, high affected users, high discoverability)
  • Mitigation: Add timestamp + nonce to unlock commands; reject commands >30 seconds old

Objective: Conduct a practical vulnerability assessment on an IoT device to identify security weaknesses.

Scenario: You have a smart camera that you want to test for vulnerabilities before deploying 100 units in your facility.

Tasks:

  1. Network scanning: Use nmap to identify open ports and services:

    nmap -sV -p- 192.168.1.100
    • Document all open ports (common IoT: 22-SSH, 23-Telnet, 80-HTTP, 443-HTTPS, 554-RTSP, 8080-Web)
    • Check for unnecessary services that should be disabled
  2. Default credential testing: Try common default passwords:

    • admin/admin, admin/password, root/root, admin/12345
    • Document if any work (CRITICAL vulnerability if yes)
  3. Firmware analysis: Download firmware and analyze:

    binwalk -e firmware.bin
    strings firmware.bin | grep -i "password\|key\|secret"
    • Look for hardcoded credentials, API keys, or encryption keys
    • Check if firmware is encrypted/obfuscated
  4. Web interface testing: Access device web interface:

    • Test for SQL injection: admin' OR '1'='1
    • Test for XSS: <script>alert('XSS')</script>
    • Check if HTTPS is enforced or if HTTP is allowed

Expected Outcome: Vulnerability assessment report with:

  • List of open ports and services (with risk ratings)
  • Default credentials test results
  • Hardcoded secrets found in firmware
  • Web vulnerabilities discovered
  • Risk score (1-10) and remediation recommendations

Safety Note: Only test devices you own. Unauthorized testing is illegal.

Objective: Practice responding to a real-world IoT security incident using established incident response procedures.

Scenario: Your security monitoring detects unusual activity:

  • Smart sensor #42 (normally sends 10KB/hour) suddenly sends 10MB in 5 minutes
  • Traffic analysis shows sensor is communicating with unknown external IP 185.220.101.x (known botnet C&C server)
  • 50 other sensors are showing similar suspicious patterns

Tasks:

  1. Identification (5 minutes):
    • Confirm the incident is real (not false positive)
    • Classify severity: Low/Medium/High/Critical
    • Identify affected systems and data
  2. Containment (10 minutes):
    • Immediate: Network-isolate all 51 affected sensors (VLAN quarantine or firewall block)
    • Short-term: Disable sensor accounts/credentials to prevent further spread
    • Document all containment actions with timestamps
  3. Eradication (15 minutes):
    • Analyze one compromised sensor: what malware is running? How did it get there?
    • Identify root cause: Default password? Firmware vulnerability? Physical tampering?
    • Develop eradication plan: Firmware reflash? Password reset? Replace hardware?
  4. Recovery (10 minutes):
    • Restore sensors from clean firmware backup
    • Reset all credentials (unique per device)
    • Gradually return sensors to production with enhanced monitoring
  5. Lessons Learned (10 minutes):
    • Document timeline of events
    • Identify security control gaps that allowed compromise
    • Update security policies and implement new controls
    • Calculate cost of incident (downtime, labor, reputation)

Expected Outcome: Incident response report with:

  • Incident timeline (detection -> containment -> eradication -> recovery)
  • Root cause analysis (how did attacker compromise 51 sensors?)
  • Containment actions taken and their effectiveness
  • 5+ recommendations to prevent recurrence

Real-World Learning: This simulates the 2016 Mirai botnet incident. Understanding incident response procedures minimizes damage when (not if) breaches occur.

Objective: Conduct a systematic security audit using the OWASP IoT Top 10 checklist.

Scenario: Youโ€™re auditing a smart home hub device before recommending it for enterprise deployment.

Audit Checklist:

# Vulnerability Test Method Pass/Fail Notes
I1 Insufficient Security Configurability Check if password can be changed, complexity requirements
I2 Insecure Web Interface Test for XSS, CSRF, session management issues
I3 Insufficient Authentication Try default credentials, check for MFA support
I4 Insecure Network Services Port scan, check for Telnet, unencrypted services
I5 Insecure Software/Firmware Check for update mechanism, verify signatures
I6 Hardware Limitations Inspect for JTAG, UART, debug ports
I7 Insecure Cloud Interface Test API authentication, check for credential exposure
I8 Unintended Device Usage Review privacy policy, data collection scope
I9 Privacy Concerns Check what data is collected, where itโ€™s stored
I10 Insecure Default Settings Review factory defaults, UPnP status

Deliverable: Complete audit report with findings, severity ratings, and remediation recommendations.

Objective: Design network segmentation for an IoT deployment using IEC 62443 zone principles.

Scenario: Manufacturing facility with:

  • 200 production sensors (temperature, pressure, flow)
  • 50 industrial cameras
  • 20 PLCs controlling machinery
  • 10 HMI workstations
  • Enterprise network with 500 employees

Tasks:

  1. Define zones based on security level requirements (SL1-SL4)
  2. Design conduits (controlled data flows between zones)
  3. Specify firewall rules for each zone boundary
  4. Plan monitoring for each zone

Expected Output:

  • Zone diagram with security levels
  • Firewall rule matrix
  • Monitoring strategy per zone

1395.2 Additional Knowledge Checks

1395.3 Whatโ€™s Next

Now that youโ€™ve practiced security exercises, continue to: