<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>IoT on System Overlord</title><link>https://systemoverlord.com/tags/iot.html</link><description>Recent content in IoT on System Overlord</description><generator>Hugo</generator><language>en-us</language><managingEditor>david@systemoverlord.com (David Tomaschik)</managingEditor><webMaster>david@systemoverlord.com (David Tomaschik)</webMaster><lastBuildDate>Fri, 10 Aug 2018 00:00:00 +0000</lastBuildDate><atom:link href="https://systemoverlord.com/tags/iot/index.xml" rel="self" type="application/rss+xml"/><item><title>I'm the One Who Doesn't Knock: Unlocking Doors From the Network</title><link>https://systemoverlord.com/2018/08/10/im-the-one-who-doesnt-knock-unlocking-doors-from-the-network.html</link><pubDate>Fri, 10 Aug 2018 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2018/08/10/im-the-one-who-doesnt-knock-unlocking-doors-from-the-network.html</guid><description>&lt;p&gt;&lt;img src="https://systemoverlord.com/img/blog/iot_hacker.png" alt="IoT Hacker"&gt;{:.right}&lt;/p&gt;
&lt;p&gt;Today I&amp;rsquo;m giving a talk in the &lt;a href="https://www.iotvillage.org"&gt;IoT Village&lt;/a&gt; at DEF
CON 26. Though not a &amp;ldquo;main stage&amp;rdquo; talk, this is my first opportunity to speak
at DEF CON. I&amp;rsquo;m really excited, especially with how much I enjoy IoT hacking.
My talk was inspired by the research that lead to
&lt;a href="https://systemoverlord.com/2017/12/18/cve-2017-17704-broken-cryptography-in-istar-ultra-ip-acm-by-software-house.html"&gt;CVE-2017-17704&lt;/a&gt;,
but it&amp;rsquo;s not meant to be a vendor-shaming session. It&amp;rsquo;s meant to be a
discussion of the difficulty of getting physical access control systems that
have IP communications features right. It&amp;rsquo;s meant to show that the designs we
use to build a secure system when you have a classic user interface don&amp;rsquo;t work
the same way in the IoT world.&lt;/p&gt;
&lt;p&gt;(If you&amp;rsquo;re at DEF CON, come check it out at 4:45PM on Friday, August 10 in the
IoT Village.)&lt;/p&gt;</description></item><item><title>The IoT Hacker's Toolkit</title><link>https://systemoverlord.com/2018/04/16/the-iot-hackers-toolkit.html</link><pubDate>Mon, 16 Apr 2018 12:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2018/04/16/the-iot-hackers-toolkit.html</guid><description>&lt;p&gt;Today, I&amp;rsquo;m giving a talk entitled &amp;ldquo;The IoT Hacker&amp;rsquo;s Toolkit&amp;rdquo; at
&lt;a href="https://bsidessf.org"&gt;BSides San Francisco&lt;/a&gt;. I thought I&amp;rsquo;d release a companion
blog post to go along with the slide deck. I&amp;rsquo;ll also include a link to the
video once it gets posted online.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;TOC
{:toc}&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;From my talk synopysis:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;IoT and embedded devices provide new challenges to security engineers hoping
to understand and evaluate the attack surface these devices add. From new
interfaces to uncommon operating systems and software, the devices require
both skills and tools just a little outside the normal security assessment.
I&amp;rsquo;ll show both the hardware and software tools, where they overlap and what
capabilities each tool brings to the table. I&amp;rsquo;ll also talk about building the
skillset and getting the hands-on experience with the tools necessary to
perform embedded security assessments.&lt;/p&gt;</description></item></channel></rss>