Security Alerts & News
by Tymoteusz A. Góral

History
#1340 Embedded hardware hacking 101 – the Belkin WeMo link
Devices that are connected to the Internet or run a full operating system are becoming more and more prevalent in today’s society. From devices for locomotives to wireless light switches, the Internet of Things (IoT) trend is on the rise and here to stay. This has the potential to make our lives much easier; however, the increasing sentience of once analog devices also enables adversaries to target them and potentially misuse them.

With the ubiquity of these Internet-connected devices, there is a surplus of “Things” to exploit. The main intent of this blog post is to generalize how an individual would reverse engineer an embedded device and the process for attempting to find vulnerabilities.

For this demonstration, we will be looking at the WeMo Link, which is a part of the Belkin WeMo LED Lighting Starter Set (http://www.belkin.com/us/p/P-F5Z0489/). There have been vulnerabilities identified in previous iterations of this device; however, these vulnerabilities were more focused on the web services component and not based on analyzing the built-in security of the physical components.
Read more
#1344 Juniper acknowledges equation group targeted ScreenOS
#1343 Northsec 2016 Conference - www.nsec.io (VIDEO)
#1342 Test: parental control apps for Android
#1341 Threat intelligence report for the telecommunications industry
#1340 Embedded hardware hacking 101 – the Belkin WeMo link
#1339 A 'Tor General Strike' wants to shut down the Tor network for a aay
#1338 Hancitor downloader shifts attack strategy
#1337 Obihai patches memory corruption, DoS, CSRF vulnerabilities in IP phones
History
2017: 01 02 03 04 05
2016: 01 02 03 04 05 06 07 08 09 10 11 12