Interested by the possibility to get my hands dirty and exploit vulnerabilities, I decided to participate. They told me that most of the devices here had vulnerabilities and that anyone was welcome to sit down and attempt to exploit them. I was fascinated by the devices that they had and decided to talk to them about what was going on. Nearing the end of the day, I decided to check out the IoT Hack Lab. On the first day of the conference, I was walking around, talking to a bunch of vendors to see what they did, what software or hardware they made, and what services they offered. They also had a video demonstration of the exploitation of vulnerabilities in a home router. They brought with them a table full of devices ranging from routers to smart televisions. Researchers from Tripwire were on hand to help attendees explore the world of IoT hacking. These devices or “things” can vary greatly in terms of their capabilities, such as smart light bulbs, smart thermostats, and smart outlets, like the one that I will be talking about later in this post.
The term Internet of Things (IoT) refers to physical devices that have networking capabilities. My favorite activity was the Internet of Things Hack Lab sponsored by Tripwire. There were many activities hosted at SecTor 2015.
Customers are encouraged to install the latest update immediately. *Updated – NOTE: The WeMo attack vector described in this article was resolved with WeMo firmware release.