IoT / Automotive / Embedded Linux penetration test
IoT / Automotive / Embedded Linux penetration test is simulated attack against your embedded device which aims to uncover weak points in its cyber security. Outcome of such penetration test is a comprehensive report and presentation that summarizes all security vulnerabilities found in your application and outlines optimal strategy to mitigate them.
Auxilium Cyber Security has experience testing broad range of embedded device ranging from military unit for protection of classified information through car head units to industrial routers.
Main goal of penetration test is to address vulnerabilities of your embedded device and propose adequate steps to mitigate them.
Methodology of IoT/ automotive / embedded Linux penetration tests
We have fully equipped embedded Linux penetration testing laboratory to carry out penetration test against various interfaces on embedded devices. We always adapt penetration test to the given device and we use some of the following scenarios:
- Attacking device via WiFi
- Attacking device via Bluetooth
- Attacking device via media player/USB
- Attacking device via CAN/UDS
- Attacking device via Internet connection
- Attacking device via CarPlay/MirrorLink/Android Auto
- Attacking device via Internet Browser
- Attacking device via physical interfaces + bootloader
- Attacking device via update procedure
- Attacking device via web administration system
- Finding Local Privilege Escalation misconfigurations
- Finding outdated/vulnerable components (libraries, etc.)
- And much more depending on a device
Penetration test of embedded Linux and Android systems is our key specialization. We operate own penetration testing lab, which is fully equipped with laboratory power supplies, USB2CAN adapters and OBDII diagnostics, USB-UART, multimeters, rooted Android and jailbroken iPhone phones, WiFi and Bluetooth controllers and much more.
UNECE WP.29 and ISO/SAE-21434 (automotive)
Appropriate cyber security measures will be integral part of all new vehicle registration on the markets following UNECE WP.29 (United Nations Economic Commission for Europe). This includes all EU countries together with UK, Turkey, Japan, Russia, Australia and others.
OEMs registering new vehicles for those markets must demonstrate Cyber Security Management System is in place covering among others:
- The processes in place to verify that the risks identified are appropriately managed;
- The processes used for testing the cyber security of a vehicle type;
Auxilium Cyber Security offers to conduct automotive penetration testing following UNECE WP.29 Annex 5 list of threats that complies with the certification requirement. You may therefore utilize results of our project towards your certification target.
Our approach to IoT / Automotive / Embedded Linux penetration tests
1. Understanding our clientWe start by gaining close understanding of our client’s business and technical needs as well as gathering information about API itself, mainly number of endpoints and its architecture.
2. Agreement on commercial offerDetailed commercial offer is prepared based on our understanding of your needs and requirements. Such offer includes penetration test methodology, testing scenarios, way of reporting results and the scope of the penetration tests. Outcome of this phase formally agreed penetration testing offer.
3. Penetration testingPenetration test itself is carried out strictly in accordance with our common agreement. During the actual penetration testing our team reveals vulnerabilities in your API and demonstrate you how they can be misused by a hacker.
4. ReportingWe deliver detailed penetration testing report to your team. Such report includes all vulnerabilities together with suggestions on how to mitigate them. If required, we can also prepare executive summary presentation for your management to help you efficiently communicate such results to company decision-makers
5. Assistance with vulnerability mitigationIf your company has limited internal capacity, we can provide a support with mitigation of identified vulnerabilities.
6. Educating your dev teamWe can also prepare tailor-made secure coding guidelines and training for your dev team which would reflect results of performed penetration test. This would help your team to avoid making same security mistakes again.
Why Auxilium Cyber Security?
- Experienced penetration testers with OSCP, OSCE or CISM certification
- Conducting in-house research in the cyber security field
- We deliver comprehensive penetration testing reports with proposed vulnerability mitigations
- We can support you in English, German, or Czech
- We have experiences with web applications penetration testing since 2015
- We can provide secure coding guidelines and training reflecting penetration test results
Our research in the field of cyber security of IoT / automotive
- [CVE-2021-29507] Improper Input Validation leads to buffer overflow in dlt-daemon
- CANdy – automated CAN bus message mapping framework
- [CVE-2020-24807] File Type Restriction Bypass in Socket.io-file NPM module
- [CVE-2020-15779] Path Traversal in Socket.io-file NPM module
Selected reference in the field of penetration testing of IoT / automotive
- ENISA – The European Union Agency for Cybersecurity: Design and implementation of a computer virus for Linux airport IP cameras. The virus was designed for the pan-European security exercise Cyber Europe 2018.
- Retia: Penetration test of army unit for protection of classified information, including web interface. See more here.
- German automotive supplier: Penetration test of many Linux based head units (smart radio). See more here.
- Advantech B+B SmartWorx: Penetration test of Linux based industry router. See more here.
- Jablotron: Penetration tests of home alarm system
TelefonGermany: +49 (0) 7243 - 718 77 55
Czech Republic: +420 739 467 470