https://www.youtube.com/watch?v=EjbQ-BDh4PU#t=1m19sI have wifi but I have it on a separate vlan, I do not like making stuff wireless unless it is specifically a mobile device. I wire everything that is stationary.
My biggest fear though is that Intel backdoor that was discovered a while back. It's essentially a separate cpu running on the same die. Very little is known about it, but essentially there is a backdoor where it can either use your NIC to communicate out, or it's built in 3G radio. There is very to little info about this or how to protect yourself. I was toying with a faraday cage for whole server room but it would require a pretty serious overhaul as I have a lot of stuff attached to the ceiling, not to mention the floor. And even if I succeed in blocking all RF, it can still use the NIC, and probably does so at a very low level so any amount of software firewall won't be enough. All the cpus/nics will just talk to each other at it's own layer 1, perhaps at a slightly different voltage or something. At least in theory. Little is known about how this actually works.
I would not be surprised if AMD does the same. This is probably mandated by the government.
Devices can open up ports using UPnP. Also, with IPv6, there's no such thing as NAT.Yeah but it's also good idea to not actually connect stuff directly to the internet. even a basic NAT firewall will protect you. That's what I'm wondering about all these IoT devices being hacked... are people actually connecting these stuff DIRECTLY, like without a router? Or are they actually port forwarding... telnet, of all things? It just seems strange to me.
Mirai supposedly hacks devices running BusyBox. Beyond that I suppose it's either a case of finding exploits or having a list of default passwords.What devices are we talking about? I can't any reference anywhere as to specific models hacked. I'm curious because not only do they need to be compromised, they also have to be directed to attack somehow. Are they writing scripts for all of these?
Devices can open up ports using UPnP. Also, with IPv6, there's no such thing as NAT.
Hmm, my internet went out the other day, and my FIOS router's power light was flashing green, for a short bit. Seemed like a soft-reset? Maybe due to a firmware flash?
Initially, I thought that Verizon was updating the firmware to block out this botnet, but now I think it might be 0wn3d by the botnet.
I know that Verizon FIOS routers are open to the "outside", at least to the extent that the manageability ports are open from the outside. They're supposedly protected, but who knows how well.
I would not even bother sending the password to them. They'd be locked out until they smarten up and don't expose that shit to the internet in first place.
Robert Page, lead penetration tester at security firm Redscan, said: “It’s interesting that nobody has yet claimed credit for the attack. The relative ease at which DDoS attacks are to execute, however, suggests that the perpetrators are most likely teenagers looking to cause mischief rather than malicious state-sponsored attackers.”
So you're looking to test some penetrators?Lead Penetration Tester.
How do I get that job?
So you're looking to test some penetrators?![]()
I prefer to think of it as IoDP: Internet of Default PasswordsI have also none, but i do worry about my TV which is a smart tv. It gets regular updates, so i assume and hope that any discovered security flaws get fixed too.
The raspberry pies i have are my own responsibility.
I also do not like the term. It is as if the person who invented it has a restricted vocabulary.
How about ICDs ? Internet Connected Device.
Well I'm all out of video cards, but give me a week and I can pay you in all the candy you could want.well, depending on my role, the salary would have to scale appropriately.
Here's an IoT self scanner
http://iotscanner.bullguard.com/
(It doesn't actually scan - it just checks if your IP is already listed)
I have port 80 opened for something but if you go to it it just goes to a place holder page, so it seems to think that it's an IoT device. I'm guessing this is nothing more than just a port scanner. Still useful though if you want to double check if you have anything accessible from the outside.
Which got me thinking, would be neat to setup a site where it does a full nmap of your IP and emails you the results. (it can take a while to do a full scan). Wonder if there's any legal repercussions to setting something like this up.
Here's an IoT self scanner
http://iotscanner.bullguard.com/
(It doesn't actually scan - it just checks if your IP is already listed)
Thanks guys. I have IP cameras but don't expose them to the net and have changed the default passwords. I also have a couple of NASes, but with the latest OS and security updates, and they are also not accessible over the net.they also have the deep scanner
http://iotscanner.bullguard.com/deep-scan/
“We don’t know why there is a spear squarely pointed at our chest,” Liu said.
Hah, spear, to a point.I actually agree with them, to a point. The problem is the lesson I learned in programming class: don't allow your users to do stupid stuff. All they need to do on future models is require a password change the moment you connect to the device...like literally not let the user get into the settings without providing the webcam with a new password. People constantly have problems with hacks & stuff like this because they don't change their default Linksys password from admin/admin to something else. The problem is, most people are not technical enough to know that they should do that, therefore the company does have a social responsibility to tweak the software to stupid-proof it. Same with email...imo 2FA should be required on everything. Mandatory quarterly password changes should be required. Amazon, Gmail, Outlook, Hotmail, Yahoo, you name it. Force your customers to protect themselves.
My SmartTV actually got infected by a "free movie" app on the Samsung store. I detected the traffic on my Juniper firewall a few weeks ago and ended up resetting the TV.
Wonder if something similar was the entry-point on other devices.