Teaching and Learning IoT Cybersecurity and Vulnerability Assessment with Shodan through Practical Use Cases
Abstract
:1. Introduction
- A practical use case-based teaching methodology is proposed. Such a methodology is based on Shodan [17], an online tool that accelerates significantly the IoT device reconnaissance stage, which is usually the most time and resource consuming stage on a cybersecurity assessment.
- This article also provides an introduction to the basics on IoT cybersecurity for future developers, which can harness Shodan Application Programming Interfaces (APIs) to build tools to automate IoT device vulnerability assessments.
- A theoretical and empirical approach to IoT security is provided to help educators to replicate the teaching results obtained by the authors, which have successfully put them in practice in seminars and master courses since 2018. For such a purpose, multiple practical use cases are provided together with useful guidelines to prevent Shodan-based attacks.
2. Related Work
2.1. Cybersecurity Teaching and Learning
2.2. Shodan for IoT Cybersecurity
3. Teaching Methodology
- Introduction to the main IoT cybersecurity concepts. In this first part, the basics on IoT topics like IoT communications architectures, common IoT devices, and attacks to IoT systems are addressed.
- Introduction to the vulnerability assessment tool. This second part deals with the basics on the use of Shodan.
- Practical use case-based analysis. A set of use cases is given to the students in order to apply to them the proposed analysis methodology. At this point no knowledge of computer programming is required, only a web browser with access to Shodan.
- IoT audit/attack automation. In this final part the students learn how to develop scripts to automate the cybersecurity assessments that in the previous part they performed manually through the Shodan web interface.
- Essential IoT cybersecurity Part I (theory, week 1).
- Introduction to IoT.
- Traditional IoT architectures.
- Advanced IoT architectures.
- Shodan basics (lab 1, week 1).
- Introduction to Shodan.
- How Shodan works internally.
- Shodan basic use.
- A first search with Shodan.
- Essential IoT cybersecurity Part II (theory, week 2).
- Popular IoT devices.
- Main components of an IoT device.
- Main IoT-device security problems.
- Practical IoT security analysis with Shodan (lab 2, week 2).
- Analysis methodology.
- Practical use cases.
- –
- Webcams.
- –
- Home automation systems.
- –
- Home devices.
- Essential IoT cybersecurity Part III (theory, week 3).
- Common IoT-device vulnerabilities and attacks.
- Shodan query automation (lab 3, week 3).
- Final project (weeks 4-6).
4. Essential IoT Cybersecurity
4.1. Main Concerns on IoT Security
4.2. Traditional and Advanced IoT Architectures
4.3. Popular IoT Devices and Cyberattacks
- An evil twin attack can be performed to create a fake local gateway that is able to route IoT device communications to another remote server.
- DoS or DDoS attacks can be performed on the cloud, thus preventing users from sending commands or receiving information from the IoT devices. Similar results may be achieved by carrying out such Dos/DDoS attacks on the communications gateways, which are usually less powerful and less prepared for supporting cyberattacks.
- Weakly encrypted or plain-text communications can be intercepted through sniffers or Man-in-The-Middle (MiTM) attacks, which can gather data on the user or on certain IoT device activities.
- Insecure IoT systems can also be affected by MiTM attacks that are able to modify commands or IoT device responses so as to change the expected behavior of the system.
- Hardware attacks. This kind of attacks is related to vulnerabilities that affect certain hardware parts embedded into an IoT device. Examples of such attacks are:
- –
- Physical attacks.
- –
- Battery/power removal.
- –
- Reverse engineering of the hardware.
- –
- Denial of Service (DoS) attacks to drain batteries.
- Software attacks. These vulnerabilities are related to software bugs or to certain misbehavior that lead to security problems. For instance, some software attacks of this type are:
- –
- Software reverse engineering.
- –
- Software vulnerabilities that have or have not been properly patched.
- –
- Malicious software injection.
- –
- Weak cryptographic implementations.
- Connectivity attacks. As connectivity is key for implementing the IoT paradigm, IoT devices are vulnerable to traditional attacks aimed at intercepting the exchanged data or at triggering certain behaviors by impersonating an authorized third party. Thus, some of the most relevant connectivity attacks are:
- –
- DoS attacks.
- –
- Jamming and radio interference.
- –
- IoT node impersonation and Sybil attacks.
- –
- Man-in-the-Middle attacks.
- –
- Network protocol attacks.
4.4. IoT Audit/Attack Methodology
- Reconnaissance. In this phase the auditor/attacker gathers information on the IoT target. The collected data may come from multiple sources (e.g., manufacturers, IoT providers, and hardware datasheets) and includes the traditional port scanning process in order to determine which services are available.
- Audit/Attack plan. The auditor/attacker designs the steps involved in the devised audit/attack strategy and selects the most appropriate tools to implement the plan. In many cases it is necessary to develop specific tools to later exploit certain IoT device vulnerabilities.
- Access to the IoT system. The previously selected tools are used to access the IoT system. Such tools exploit hardware, software, or connectivity vulnerabilities.
- Execution. After accessing the system, an attacker/auditor will put in practice the previously planned strategy to take control of one or more IoT devices. It is common to make use of certain software mechanisms to maintain the access to the IoT system for future intrusions (e.g., by opening a backdoor).
5. Shodan Basics
5.1. Aims and Inner Working
- A random IPv4 is generated.
- A random port is selected among the ones supported by Shodan, which are usually related to essential services.
- The crawler tries to connect to the select IP and port, and if a connection is established, it collects the banner.
- Go back to step 1.
5.2. Basic Use and Web Interface
- country: it specifies the country of the detected devices through an ISO 3166-1 alfa-2 code. For instance, if the previous Shodan search was meant to be limited to the United States, the following query text should be indicated: “openwrt country:US”.
- city: it indicates the city of the devices to be located. For instance: “openwrt city:Barcelona”.
- geo: it allow for filtering the results depending on their geographical coordinates. If, for instance, the previous results were aimed at obtaining the OpenWrt devices that are located next to Paris city center, the Shodan search would be: “openwrt geo:48.860151,2.336200”. Moreover, this filter can received a third parameter that indicates the maximum radius of the search. For example, the previous search can be modified to obtain the devices that are in a circle of one kilometer around coordinates 48.860151, 2.336200: “openwrt geo:48.860151,2.336200,1”.
- net: it filters the results according to an IP range indicated in Classless Inter-Domain Routing (CIDR) notation. An example would be: “openwrt net:37.13.0.0/16”.
- port: it allows for filtering the results depending on the detected open ports. For instance, the following Shodan query would return the OpenWrt devices whose port 21 (FTP) is open: “openwrt port:21”.
- org: it filters the results according to the organization they belong to. As an example, the following query would indicate the OpenWrt devices that are managed by Amazon: “openwrt org:amazon”.
6. Practical IoT Security Use Case Analysis with Shodan
6.1. Use Case Analysis Methodology
6.1.1. Teacher Perspective
- As a first step, the teacher will give the students a list of Shodan searches (like some of the given in Section 6.2).
- Basic analysis. The students analyze the results obtained by each query and determine which IoT device they are looking for and what it is used for. This process usually involves multiple Google searches to look for vendor information like device manuals/datasheets.
- Vulnerability assessment. The students study the vulnerabilities detected by Shodan, they look for default credentials and for other potential cybersecurity problems.
- First, the teacher would give the students the following Shodan query without giving further details on the IoT device: webcamxp.
- Next, the students would introduce the query in Shodan and would find out that several thousands of results (more than 5000 as of writing) are shown, most of which are related to a webcam software. As Shodan currently returns a relevant number of honeypots, the students would have to make use of filters to retrieve real webcams. For instance, a refined Shodan search would be: product:“webcamXP httpd”.
- After applying the appropriate filters, it is not difficult to find open webcams like the one shown in Figure 9 on the right. It is also straightforward to find further information on the software by looking for webcamxp manual through a web search engine.
- Finally, the students will look for security vulnerabilities of the IoT device. In this specific case, the vast majority of the detected webcams neither make use of passwords or implement any kind of access restrictions to control the webcam. The cybersecurity of the hosts that make use of each webcam can be further analyzed with the help of Shodan (e.g., open ports or services), but such a traditional analysis is in general out of the scope of a course focused on IoT cybersecurity.
6.1.2. IoT Researcher Perspective
- Determine the target IoT device.
- Build the Shodan search. This first step requires to determine the most appropriate query and its filters in order to obtain the desired list of target IoT devices.
- Look for additional information on the target IoT device. This process may involve looking for information provided by the manufacturer or for the default credentials indicated in the user manual.
- Vulnerability assessment. In this step it is necessary to analyze the vulnerabilities found by Shodan, the security data provided by the manufacturer or already published Common Vulnerability and Exposure (CVE) reports.
- First, the researcher would set as an objective to find vulnerable webcams that make use of WebcamXP software.
- Next, the researcher will design a first Shodan query (for instance, webcamxp) to retrieve the maximum possible amount of IoT devices. Once a webcam is successfully detected (like the one shown in Figure 9 on the right), the Shodan search can be easily refined to avoid collecting data from honeypots and from other devices that include the word webcamxp in their banner. For such a purpose, the researcher can analyze the raw information collected by Shodan and select certain fields and values that are highly likely to remain constant for most of the targeted IoT devices. For instance, filtering out by product (Shodan query: product:“webcamXP httpd”) or by certain fields of the HTTP header (Shodan query: “Pragma: no-cache Server: webcamXP”) can be useful.
- At this point, the researcher may be interested in finding more information on the possibilities that the webcam software can bring to a remote auditor/attacker. For such a purpose, further information on the webcam software is available on the WebcamXP user manual, which can be easily found through a web search engine.
- Although most of the WebcamXP webcams found through Shodan are completely open, the researcher may be interested in exploring further security vulnerabilities of the detected IoT devices. In such a case, CVE repositories like CVE Details allow for searching for WebcamXP vulnerabilities [74], showing three CVE reports: CVE-2008-5862, CVE-2005-1190, and CVE-2005-1189. Shodan academic users can make use of the mentioned CVE IDs and Shodan’s vulnerability filter to obtain vulnerable devices directly (Shodan query: vuln:CVE-2008-5862).
6.2. Practical Use Cases
6.2.1. Webcams and Video Surveillance Systems
- Linksys WVC80N Wireless Internet Camera (Shodan query: WVC80N). This is a webcam for home monitoring that is more than 10 years old, but that still is serving in homes and industrial installations. The problem is that many users either use the default credentials (admin/admin) or do not use authentication at all, which causes a privacy problem (an example of screenshot obtained from an open WVC80N webcam is shown in Figure 9 on the left).
- ExacqVision (Shodan query: “server: wfe”). This is a video surveillance system that allows for watching and managing multiple webcams through a web interface. The problem is that a significant number of users do not configure authentication or make use of weak/default credentials.
- AXIS webcams (Shodan query: “port:80 has_screenshot:true”). As of writing, more than 3000 of these webcams can be found through Shodan, many of them requiring no credentials to watch them.
- AVTECH IP webcams (Shodan query: linux upnp avtech). More than 180,000 AVTECH devices can be currently found by Shodan with the previous query, although many of them require credentials to access the video stream. Although the latest firmware versions ask for a verification code, there is a significant number of webcams that make use of the default credentials (admin/admin).
6.2.2. Home Automation Systems
- JUNG KNX (Shodan query: Jung KNX). This is a home automation system whose smart control panel can be accessed remotely with no need for credentials (an example of such a smart panel is shown in Figure 10 on the left).
- Jeedom (Shodan query: Jeedom). It is a French open-source home automation system that usually provides a web interface and, in many cases, an open Message-Queue Telemetry Transport (MQTT) broker.
- Somfy alarm system (Shodan query: title:“Centrale" Pragma:"no-cache, no-store”). The previous search allows for locating thousands of Somfy alarm systems, which provide a web interface for remote user authentication.
- Insteon home automation system (Shodan query: title:“powered by insteon”). Most of the Insteon installations located through the previous Shodan search require no authentication, so remote users can interact directly with them (a example of an already hacked system is shown in the screenshot in Figure 10 on the right).
- Creston control hub (Shodan query: Crestron PYNG-HUB). The web panel of this hub is used by hundreds of users to monitor and control their home automation devices.
6.2.3. Home Devices
- iKettle (Shodan query: ikettle). It is a smart appliance to boil water remotely.
- WebIOPi (Shodan query: webiopi). It is a framework for creating and deploying IoT applications with Raspberry Pi. Many installations are not password protected (an screenshot from one of such installations that monitors environmental temperature is shown in Figure 11 on the left).
- Open Virtual Network Computing (VNC) systems (Shodan query: has_screenshot:true product:VNC “authentication disabled”). The previous query allows for detecting VNC systems whose authentication has been disabled.
- MQTT brokers (Shodan query: “MQTT Connection Code: 0” set –alarm). Although MQTT is very popular among IoT developers, its security, in many cases, is neglected. Thus, the previous Shodan query finds a significant number of open MQTT brokers.
- Yamaha AV receiver (Shodan query: “HTTP/1.1 406 Not Acceptable” “Server: AV_Receiver”). Many Yamaha Internet-enabled AV receivers, which provide a remote web interface, have disabled their authentication (a screenshot of one of them is shown in Figure 11 on the right).
6.3. Automating Attacks
6.3.1. Shodan APIs
6.3.2. Teaching Shodan Scripting
- Install the code development environment. This usually requires importing Shodan search library.
- Perform an initial Shodan query through the code to find a specific version of an IoT device.
- Modify the code in (2) to print the IP and country of every obtained result.
- Modify the code in (3) to print, for each detected IoT device that has vulnerabilities, the number of detected exploits according to Shodan exploit REST API.
- First, it is necessary to install Python and then install the Shodan module with the command “pip install shodan”.
- An example of the script required for carrying out step 2 is shown in Listing 1 (between lines 1 and 15). Note that, in order to execute the script, it is necessary to indicate the Shodan API key of the developer. In the example, the indicated query can be changed to adapt to the user needs.
- Listing 1 also shows the part of the script to perform step 3 (between lines 1 and 25). It is worth noting that a 1 second delay is needed, as Shodan may limit the number of requests to one per second.
- Step 4 can be implemented in Python with the code below line 26 of Listing 1, which makes use of the exploit REST API.
Listing 1: Example of Python script to automate Shodan queries. |
6.4. Practical Teaching Results
- Sixteen reports were delivered, with an average of 33 pages per report.
- Different Shodan queries were performed to target 16 specific IoT devices.
- On such 16 IoT devices, 675 non-patched vulnerabilities were found related to already published CVEs.
- Roughly 320 IPs and their running services were analyzed making only use of the information provided by Shodan (no additional scanning tools were used).
- Of the 320 analyzed IoT devices, 87 of them required no credentials to access private data or to manage the device. Moreover, 21 of them made use of the default user or administrator credentials. These results indicate that roughly one out of three analyzed IoT devices could be easily accessed by a remote attacker.
- Mootools-based webcams:
- Shodan query: (“webcam 7” OR “webcamXP”) http.component:“mootools”-401
- Relevant results:
- –
- All the 20 analyzed webcams required no credentials to view their content.
- –
- Seven of the webcams were used as surveillance cameras in industrial scenarios, while 4 of them were aimed at watching road traffic in specific areas. In addition, 5 of the cameras were used as home surveillance systems. The other 4 webcams were used for monitoring public spaces.
- –
- Of the 20 analyzed systems, four of them made use of services and software affected by 66 vulnerabilities that were already documented as CVEs.
- Insteon smart home controller:
- Shodan query: title:“powered by insteon”
- Relevant results:
- –
- Only 19 results were obtained. Most of the IPs were located in Taiwan and were deployed in homes.
- –
- Of the 19 IoT systems, 15 of them required no credentials to interact with the smart home system.
- Somfy alarm system:
- Shodan query: title:“Centrale” Pragma: “no-cache, no-store”
- Relevant results:
- –
- Several of the analyzed systems made use of the default credentials, so attackers could access the alarm system and enable or disable it at will.
- IoT Proliphix thermostats:
- Shodan query: title:“Status & Control”
- Relevant results:
- –
- A relevant number of the studied IoT systems either used the default user or administration credentials, so a remote attacker could easily watch and manipulate the thermostat.
- Tesla PowerPack system:
- Shodan query: http.title:“Tesla PowerPack System”
- Relevant results:
- –
- Some of the analyzed IoT systems could be accessed as administrator by making use of the default credentials. However, most of the systems found through Shodan were actually classified as honeypots.
- Cannon VB-M600 network camera system:
- Shodan query: title:“Network Camera VB-M600” “200 ok server: vb”
- Relevant results:
- –
- Of the 20 analyzed systems, nine of them could be accessed with no credentials, while four made of use of the default credentials.
- –
- The software used by these systems were affected by 359 vulnerabilities documented through already published CVEs. Such vulnerabilities were essentially related to the use of outdated versions of Linux and Apache Tomcat.
- Twonky media server:
- Shodan query: “product:TwonkyMedia UPnP” http.title:“Twonky Server”
- Relevant results:
- –
- All the devices found through the indicated Shodan query were completely open, so remote attackers can access the shared media content.
- API-based development. During the development of the scripts the students had problems when dealing with the Python wrapper API, as part of it was not properly documented.
- Critical infrastructure vulnerabilities. In case of finding vulnerabilities that affected critical infrastructures, the students were told to warn the instructor so that he/she could take the appropriate measures (e.g., to warn the company/entity through the university on the encountered problems). For instance, during the course, the mentioned procedure was used by a student that found VoIP communications system of a military company that used the default credentials.
6.5. Preventing Shodan-Based Attacks on IoT Devices: Best Practices
- Check your IP or your organization IP range to determine whether your IoT devices are already indexed by Shodan. If they are indexed, verify their connectivity needs, trying to minimize the number of them that accept incoming connections.
- Minimize the number of open ports. In addition, make use of firewalls to prevent potential intrusions.
- Always try to use HTTPS instead of HTTP. This may be difficult to implement in certain resource-constrained IoT devices. In addition, please note that it is very complex to have an individual (no self-signed) certificate for each IoT device, so try to implement additional security layers.
- Whenever possible, try to use a Virtual Private Network (VPN).
- Whenever possible, modify your IoT device banners and the exposed ports to make the reconnaissance stage difficult for potential attackers. For instance, move the necessary ports to a range that is not scanned by Shodan crawlers.
- Block Shodan crawler IPs to prevent IoT devices from being indexed. A good list of such crawler IPs can be found in [76].
- In case the IoT device cannot be protected from being indexed by Shodan:
- –
- Never use default or really common credentials (e.g., “admin”, “1234”).
- –
- Try to use long usernames and passwords to avoid brute-force attacks.
- –
- Update credentials periodically.
- –
- Keep IoT device firmware updated.
6.6. Additional Course Topics
- Ethical hacking. Students should learn about the implications and differences among black hat, white hat, and gray hat hackers, which can make use of Shodan with different purposes.
- Legality. Cybersecurity researchers and students should be fully aware of the legal dimension and potential consequences of making use of Shodan and other security tools.
- Defense against IoT attacks. Although Section 6.5 enumerates different recommendations to protect IoT devices against Shodan-based attacks, IoT devices are exposed to many more attacks, like the ones indicated in Section 4.3. Therefore, it is necessary to teach students how to protect IoT devices from physical attacks, software/hardware reverse engineering, malicious firmware updates, or rogue wireless access points.
- Critical infrastructure cybersecurity. IoT devices can be deployed in environments whose infrastructure can be considered as strategical or critical due to the impact that cyberattacks can have on them. For instance, cyberattacks on certain industries (e.g., chemical plants and power plants) or infrastructure (e.g., bridges, dams, ports and railways) can have terrible consequences, so students need to be trained on the specific characteristics of such environments and on the most commonly used monitoring devices (e.g., Programmable Logic Controllers (PLCs) and Industrial Control Systems (ICSs)).
- Mobile device security. A mobile device, like a wearable, a smartphone, or a tablet, can be considered as a specific type of IoT device that provides users with certain communications services and monitoring capabilities (e.g., by making use of embedded sensors like accelerometers, gyroscopes, and GPS). For instance, unfortunately, Shodan can find thousands of open Android devices (Shodan query: port:5555 debug) that require no credentials for accessing the internal memory, for installing new applications, or for taking pictures with the embedded camera. Therefore, students should understand how the most popular mobile operating systems and devices work, and how they can be protected against cyberattacks.
- Platform security. Robot, cobot, Unmanned Aerial Vehicle (UAVs), or Augmented/Mixed/Virtual (AR/MR/VR) platforms can be considered as IoT platforms that make use of sensors, actuators, and communications subsystems that are expected to suffer from cybersecurity attacks. Students should understand how to keep information protected, defend against unauthorized use, tampering, or even physical damage.
7. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- HIS, Internet of Things (IoT) Connected Devices Installed Base Worldwide from 2015 to 2025 (In Billions). Available online: https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/ (accessed on 9 April 2020).
- Blanco-Novoa, O.; Fernández-Caramés, T.M.; Fraga-Lamas, P.; Castedo, L. A Cost-Effective IoT System for Monitoring Indoor Radon Gas Concentration. Sensors 2018, 18, 2198. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Ayaz, M.; Ammad-Uddin, M.; Sharif, Z.; Mansour, A.; Aggoune, E.M. Internet-of-Things (IoT)-Based Smart Agriculture: Toward Making the Fields Talk. IEEE Access 2019, 7, 129551–129583. [Google Scholar] [CrossRef]
- Fernández-Caramés, T.M.; Froiz-Míguez, I.; Blanco-Novoa, O.; Fraga-Lamas, P. Enabling the Internet of Mobile Crowdsourcing Health Things: A Mobile Fog Computing, Blockchain and IoT Based Continuous Glucose Monitoring System for Diabetes Mellitus Research and Care. Sensors 2019, 19, 3319. [Google Scholar] [CrossRef] [Green Version]
- Alam, M.M.; Malik, H.; Khan, M.I.; Pardy, T.; Kuusik, A.; Le Moullec, Y. A Survey on the Roles of Communication Technologies in IoT-Based Personalized Healthcare Applications. IEEE Access 2018, 6, 36611–36631. [Google Scholar] [CrossRef]
- Fraga-Lamas, P.; Celaya-Echarri, M.; Lopez-Iturri, P.; Castedo, L.; Azpilicueta, L.; Aguirre, E.; Suárez-Albela, M.; Falcone, F.; Fernández-Caramés, T.M. Design and Experimental Validation of a LoRaWAN Fog Computing Based Architecture for IoT Enabled Smart Campus Applications. Sensors 2019, 19, 3287. [Google Scholar] [CrossRef] [Green Version]
- Lu, Y.; Xu, L.D. Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics. IEEE Int. Things 2019, 6, 2103–2115. [Google Scholar]
- Augusto-Gonzalez, J.; Collen, A.; Evangelatos, S.; Anagnostopoulos, M.; Spathoulas, G.; Giannoutakis, K.M.; Votis, K.; Tzovaras, D.; Genge, B.; Gelenbe, E.; et al. From internet of threats to internet of things: A cyber security architecture for smart homes. In Proceedings of the 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Limassol, Cyprus, 11–13 September 2019; pp. 1–6. [Google Scholar]
- IETF, RFC 8446: The Transport Layer Security (TLS) Protocol Version 1.3. August 2018. Available online: https://tools.ietf.org/html/rfc8446 (accessed on 9 April 2020).
- IETF, RFC 3156: MIME security with OpenPGP. August 2000. Available online: https://tools.ietf.org/html/rfc3156 (accessed on 9 April 2020).
- Tseng, C.H.; Wang, S.H.; Tsaur, W.J. Hierarchical and Dynamic Elliptic Curve Cryptosystem Based Self-Certified Public Key Scheme for Medical Data Protection. IEEE Trans. Reliab. 2015, 64, 1078–1085. [Google Scholar] [CrossRef]
- Rivest, R.L.; Shamir, A.; Adleman, L.M. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 1978, 21, 120–126. [Google Scholar]
- Koblitz, N. Elliptic curve cryptosystems. Math. Comput. 1987, 48, 203–209. [Google Scholar]
- Kolias, C.; Kambourakis, G.; Stavrou, A.; Voas, J. DDoS in the IoT: Mirai and Other Botnets. Computer 2017, 50, 80–84. [Google Scholar] [CrossRef]
- Ghavami, N.; Volkamer, M.; Haller, P.; Sánchez, A.; Dimas, M. GHOST-Safe-Guarding Home IoT Environments with Personalised Real-Time Risk Control. In Security in Computer and Information Sciences: First International ISCIS Security Workshop 2018; Euro-CYBERSEC; Springer: London, UK, 2018. [Google Scholar]
- Meneghello, F.; Calore, M.; Zucchetto, D.; Polese, M.; Zanella, A. IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices. IEEE Int. Things J. 2019, 6, 8182–8201. [Google Scholar]
- Shodan Official Web Page. Available online: https://www.shodan.io (accessed on 9 April 2020).
- Hölbl, M.; Welzer, T. Experience with Teaching Cybersecurity. In Proceedings of the 27th EAEEIE Annual Conference, Grenoble, France, 7–9 June 2017; pp. 1–4. [Google Scholar]
- Parekh, G.; DeLatte, D.; Herman, G.L.; Oliva, L.; Phatak, D.; Scheponik, T.; Sherman, A.T. Identifying Core Concepts of Cybersecurity: Results of Two Delphi Processes. IEEE Trans. Educ. 2018, 61, 11–20. [Google Scholar] [CrossRef]
- Salah, K.; Hammoud, M.; Zeadally, S. Teaching Cybersecurity Using the Cloud. IEEE Trans. Learn. Technol. 2015, 8, 383–392. [Google Scholar] [CrossRef] [Green Version]
- Tunc, C.; Hariri, S.; De La Peña Montero, F.; Fargo, F.; Satam, P.; Al-Nashif, Y. Teaching and Training Cybersecurity as a Cloud Service. In Proceedings of the 2015 International Conference on Cloud and Autonomic Computing, Boston, MA, USA, 21–25 September 2015; pp. 302–308. [Google Scholar]
- Wang, L.; Tian, Z.; Gu, Z.; Lu, H. Crowdsourcing Approach for Developing Hands-On Experiments in Cybersecurity Education. IEEE Access 2019, 7, 169066–169072. [Google Scholar]
- Eliot, N.; Kendall, D.; Brockway, M. A Flexible Laboratory Environment Supporting Honeypot Deployment for Teaching Real-World Cybersecurity Skills. IEEE Access 2018, 6, 34884–34895. [Google Scholar] [CrossRef]
- Čeleda, P.; Vykopal, J.; Švábenský, V.; Slavíček, K. KYPO4INDUSTRY: A Testbed for Teaching Cybersecurity of Industrial Control Systems. In Proceedings of the 51st ACM Technical Symposium on Computer Science Education, Portland, OR, USA, 11–14 March 2020; pp. 1026–1032. [Google Scholar]
- Sharevski, F.; Trowbridge, A.; Westbrook, J. Novel approach for cybersecurity workforce development: A course in secure design. In Proceedings of the IEEE Integrated STEM Education Conference (ISEC), Princeton, NJ, USA, 11 March 2018; pp. 175–180. [Google Scholar]
- Sharevski, F.; Treebridge, P.; Westbrook, J. Experiential User-Centered Security in a Classroom: Secure Design for IoT. IEEE Commun. Mag. 2019, 57, 48–53. [Google Scholar] [CrossRef]
- Ban, Y.; Okamura, K.; Kaneko, K. Effectiveness of Experiential Learning for Keeping Knowledge Retention in IoT Security Education. In Proceedings of the 6th IIAI International Congress on Advanced Applied Informatics, Hamamatsu, Japan, 9–13 July 2017; pp. 699–704. [Google Scholar]
- Figueroa, S.; Carías, J.F.; Añorga, J.; Arrizabalaga, S.; Hernantes, J. A RFID-based IoT Cybersecurity Lab in Telecommunications Engineering. In Proceedings of the Technologies Applied to Electronics Teaching Conference, La Laguna, Spain, 20–22 June 2018; pp. 1–8. [Google Scholar]
- Fernández-Caramés, T.M.; Fraga-Lamas, P.; Suárez-Albela, M.; Castedo, L.; Albela, M.; Castedo, L. A methodology for evaluating security in commercial RFID systems. In Radio Frequency Identification; IntechOpen: London, UK, 2017. [Google Scholar] [CrossRef] [Green Version]
- Topham, L.; Kifayat, K.; Younis, Y.A.; Shi, Q.; Askwith, B. Cyber security teaching and learning laboratories: A survey. Inf. Secur. 2016, 35, 51. [Google Scholar] [CrossRef] [Green Version]
- Bock, K.; Hughey, G.; Levin, D. King of the Hill: A Novel Cybersecurity Competition for Teaching Penetration Testing. In Proceedings of the 2018 USENIX Workshop on Advances in Security Education (ASE 18), Baltimore, MD, USA, 13 August 2018; pp. 1–9. [Google Scholar]
- DEF CON 27 Capture the Flag. Available online: https://www.defcon.org/html/defcon-27/dc-27-ctf.html (accessed on 9 April 2020).
- Ford, V.; Siraj, A.; Haynes, A.; Brown, E. Capture the flag unplugged: An offline cyber competition. In Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, Seattle, WA, USA, 8–11 March 2017; pp. 225–230. [Google Scholar]
- Chapman, P.; Burket, J.; Brumley, D. PicoCTF: A Game- Based Computer Security Competition for High School Students. In Proceedings of the 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14), USENIX Association, San Diego, CA, USA, 18 August 2014; pp. 1–10. [Google Scholar]
- Root Me. The Fast, Easy, and Affordable Way to Train Your Hacking Skills. Challenge Your Hacking Skills. Available online: https://www.root-me.org/?lang=en (accessed on 9 April 2020).
- Vykopal, J.; Vizvary, M.; Oslejsek, R.; Celeda, P.; Tovarnak, D. Lessons Learned From Complex Hands-on Defence Exercises in a Cyber Range. In Proceedings of the 2017 IEEE Frontiers in Education Conference (FIE), Indianapolis, IN, USA, 18–21 October 2017; pp. 1–8. [Google Scholar]
- Ruef, A.; Hicks, M.; Parker, J.; Levin, D.; Mazurek, M.L.; Mardziel, P. Build it, break it, fix it: Contesting secure development. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna Austria, 24–28 October 2016; pp. 690–703. [Google Scholar]
- Hendrix, M.; Al-Sherbaz, A.; Bloom, V. Game based cyber security training: Are serious games suitable for cyber security training? Int. J. Serious Games 2016, 3, 1. [Google Scholar]
- Knowles, B.; Finney, J.; Beck, S.; Devine, J. What children’s imagined uses of the BBC micro:bit tells us about designing for their IoT privacy, security and safety. In Proceedings of the Living in the Internet of Things: Cybersecurity of the IoT, London, UK, 28–29 March 2018; pp. 1–6. [Google Scholar]
- Liu, X.; Murphy, D. Engaging females in cybersecurity: K through Gray. In Proceedings of the 2016 IEEE Conference on Intelligence and Security Informatics (ISI), Tucson, AZ, USA, 17 November 2016; pp. 255–260. [Google Scholar]
- Zmap Official Web Page. Available online: https://zmap.io (accessed on 9 April 2020).
- Censys Official Web Page. Available online: https://censys.io (accessed on 9 April 2020).
- Thingful Official Web Page. Available online: https://www.thingful.net (accessed on 9 April 2020).
- Albataineh, A.; Alsmadi, I. IoT and the Risk of Internet Exposure: Risk Assessment Using Shodan Queries. In Proceedings of the 2019 IEEE 20th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM), Washington, DC, USA, 10–12 June 2019; pp. 1–5. [Google Scholar]
- Markowsky, L.; Markowsky, G. Scanning for vulnerable devices in the Internet of Things. In Proceedings of the 2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Warsaw, Poland, 24–26 September 2015; pp. 463–467. [Google Scholar]
- Bugeja, J.; Jönsson, D.; Jacobsson, A. An Investigation of Vulnerabilities in Smart Connected Cameras. In Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Athens, Greece, 19 March 2018; pp. 537–542. [Google Scholar]
- Vlajic, N.; Zhou, D. IoT as a Land of Opportunity for DDoS Hackers. Computer 2018, 51, 26–34. [Google Scholar]
- McMahon, E.; Williams, R.; El, M.; Samtani, S.; Patton, M.; Chen, H. Assessing medical device vulnerabilities on the Internet of Things. In Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), Beijing, China, 22–24 July 2017; pp. 176–178. [Google Scholar]
- Rae, J.S.; Chowdhury, M.M.; Jochen, M. Internet of Things Device Hardening Using Shodan.io and ShoVAT: A Survey. In Proceedings of the 2019 IEEE International Conference on Electro Information Technology (EIT), Brookings, SD, USA, 20–22 May 2019; pp. 379–385. [Google Scholar]
- Genge, B.; Enăchescu, C. ShoVAT: Shodan-based vulnerability assessment tool for Internet-facing services. Secur. Commun. Netw. 2015, 9, 2696–2714. [Google Scholar] [CrossRef]
- Nessus Official Web Page. Available online: https://www.tenable.com/products/nessus/nessus-professional (accessed on 9 April 2020).
- Williams, R.; McMahon, E.; Samtani, S.; Patton, M.; Chen, H. Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach. In Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), Beijing, China, 22–24 July 2017; pp. 179–181. [Google Scholar]
- Patton, M.; Gross, E.; Chinn, R.; Forbis, S.; Walker, L.; Chen, H. Uninvited Connections: A Study of Vulnerable Devices on the Internet of Things (IoT). In Proceedings of the 2014 IEEE Joint Intelligence and Security Informatics Conference, The Hague, The Netherlands, 24–26 September 2014; pp. 232–235. [Google Scholar]
- Al-Alami, H.; Hadi, A.; Al-Bahadili, H. Vulnerability scanning of IoT devices in Jordan using Shodan. In Proceedings of the 2017 2nd International Conference on the Applications of Information Technology in Developing Renewable Energy Processes & Systems (IT-DREPS), Amman, Jordan, 6–7 December 2017; pp. 1–6. [Google Scholar]
- Mason, G.S.; Shuman, T.R.; Cook, K.E. Comparing the Effectiveness of an Inverted Classroom to a Traditional Classroom in an Upper-Division Engineering Course. IEEE Trans. Educ. 2013, 56, 430–435. [Google Scholar]
- DEF CON Conference Official Web Page. Available online: https://www.defcon.org (accessed on 9 April 2020).
- Black Hat Conference Official Web Page. Available online: https://www.blackhat.com (accessed on 9 April 2020).
- Chaos Computer Club Official Media Repository. Available online: https://media.ccc.de (accessed on 9 April 2020).
- Suárez-Albela, M.; Fraga-Lamas, P.; Castedo, L.; Fernández-Caramés, T.M. Clock frequency impact on the performance of high-security cryptographic cipher suites for energy-efficient resource-constrained IoT devices. Sensors 2019, 19, 15. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Fraga-Lamas, P.; Lopez-Iturri, P.; Celaya-Echarri, M.; Blanco-Novoa, O.; Azpilicueta, L.; Varela-Barbeito, J.; Falcone, F.; Fernández-Caramés, T.M. Design and Empirical Validation of a Bluetooth 5 Fog Computing Based Industrial CPS Architecture for Intelligent Industry 4.0 Shipyard Workshops. IEEE Access 2020, 8, 45496–45511. [Google Scholar] [CrossRef]
- Perera, C.; Qin, Y.; Estrella, J.C.; Reiff-Marganiec, S.; Vasilakos, A.V. Fog computing for sustainable smart cities: A survey. ACM Comput. Surv. (CSUR) 2017, 50, 1–43. [Google Scholar] [CrossRef] [Green Version]
- Alturki, B.; Reiff-Marganiec, S.; Perera, C.; De, S. Exploring the Effectiveness of Service Decomposition in Fog Computing Architecture for the Internet of Things. IEEE Trans. Sustain. Comput. 2019. [Google Scholar] [CrossRef] [Green Version]
- Suárez-Albela, M.; Fraga-Lamas, P.; Fernández-Caramés, T.M. A Practical Evaluation on RSA and ECC-Based Cipher Suites for IoT High-Security Energy-Efficient Fog and Mist Computing Devices. Sensors 2018, 18, 3868. [Google Scholar] [CrossRef] [Green Version]
- Fernández-Caramés, T.M.; Fraga-Lamas, P. A Review on the Application of Blockchain for the Next Generation of Cybersecure Industry 4.0 Smart Factories. IEEE Access 2019, 7, 45201–45218. [Google Scholar] [CrossRef]
- Fernández-Caramés, T.M.; Fraga-Lamas, P. Towards post-quantum blockchain: A review on blockchain cryptography resistant to quantum computing attacks. IEEE Access 2020, 8, 21091–21116. [Google Scholar] [CrossRef]
- Strielkina, A.; Illiashenko, O.; Zhydenko, M.; Uzun, D. Cybersecurity of healthcare IoT-based systems: Regulation and case-oriented assessment. In Proceedings of the 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), Kiev, Ukraine, 24–27 May 2018; pp. 67–73. [Google Scholar]
- Alrashdi, I.; Alqazzaz, A.; Aloufi, E.; Alharthi, R.; Zohdy, M.; Ming, H. AD-IoT: Anomaly Detection of IoT Cyberattacks in Smart City Using Machine Learning. In Proceedings of the 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 7–9 January 2019; pp. 305–310. [Google Scholar]
- Trotter, L.; Harding, M.; Mikusz, M.; Davies, N. IoT-Enabled Highway Maintenance: Understanding Emerging Cybersecurity Threats. IEEE Pervasive Comput. 2018, 17, 23–34. [Google Scholar]
- Webb, J.; Hume, D. Campus IoT collaboration and governance using the NIST cybersecurity framework. In Proceedings of the Living in the Internet of Things: Cybersecurity of the IoT, London, UK, 28–29 March 2018; pp. 1–7. [Google Scholar]
- Frötscher, F.A.; Monschiebl, B.; Drosou, A.; Gelenbe, E.; Reed, M.J.; Al-Naday, M. Improve cybersecurity of C-ITS Road Side Infrastructure Installations: The SerIoT—Secure and Safe IoT approach. In Proceedings of the 2019 IEEE International Conference on Connected Vehicles and Expo (ICCVE), Graz, Austria, 4–8 November 2019; pp. 1–5. [Google Scholar]
- Matherly, J. Complete Guide to Shodan. Collect. Analyze. Visualize. Make Internet Intelligence Work for You. Available online: https://www.amazon.com/Complete-Guide-Shodan-Visualize-Intelligence-ebook/dp/B01CDIU880 (accessed on 9 April 2020).
- OpenWrt Official Web Page. Available online: https://openwrt.org (accessed on 9 April 2020).
- Javier Olmedo GitHub Repository for Shodan Filters. Available online: https://github.com/JavierOlmedo/shodan-filters (accessed on 9 April 2020).
- Vulnerabilities Collected by CVE Details for WebcamXP. Available online: https://www.cvedetails.com/vulnerability-list/vendor_id-2917/Webcamxp.html (accessed on 17 May 2020).
- Shodan Exploit API. Available online: https://developer.shodan.io/api/exploits/rest (accessed on 9 April 2020).
- List of Shodan Crawler IPs. Available online: https://wiki.ipfire.org/configuration/firewall/blockshodan (accessed on 9 April 2020).
IoT Device | Mootool-Based Webcams | Insteon Smart Home Controller | Somfy Alarm System | IoT Proliphix Thermostats | Cannon VB-M600 Network Cameras | Twonky Media Server |
---|---|---|---|---|---|---|
#Shodan Results | 141 | 19 | 17,294 | 192 | 51 | 3846 |
#Analyzed Devices | 20 | 19 | 20 | 20 | 20 | 20 |
#Devices without Authentication | 20 | 15 | - | - | 9 | 20 |
#Devices with Default Credentials | - | - | 2 | 3 | 4 | - |
#Devices Affected by CVEs | 4 | - | - | - | 1 | - |
#Detected CVEs | 66 | - | - | - | 359 | - |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Fernández-Caramés, T.M.; Fraga-Lamas, P. Teaching and Learning IoT Cybersecurity and Vulnerability Assessment with Shodan through Practical Use Cases. Sensors 2020, 20, 3048. https://doi.org/10.3390/s20113048
Fernández-Caramés TM, Fraga-Lamas P. Teaching and Learning IoT Cybersecurity and Vulnerability Assessment with Shodan through Practical Use Cases. Sensors. 2020; 20(11):3048. https://doi.org/10.3390/s20113048
Chicago/Turabian StyleFernández-Caramés, Tiago M., and Paula Fraga-Lamas. 2020. "Teaching and Learning IoT Cybersecurity and Vulnerability Assessment with Shodan through Practical Use Cases" Sensors 20, no. 11: 3048. https://doi.org/10.3390/s20113048
APA StyleFernández-Caramés, T. M., & Fraga-Lamas, P. (2020). Teaching and Learning IoT Cybersecurity and Vulnerability Assessment with Shodan through Practical Use Cases. Sensors, 20(11), 3048. https://doi.org/10.3390/s20113048