Site icon The Security Ledger with Paul F. Roberts

Video: Weaponizing Your Coffee Pot

The third annual DerbyCon wrapped up last week. Alas, I wasn’t able to make it down to Louisville, Kentucky and don a pork-pie hat with the smart people there.

Belkin’s WeMo home automation products often lacked basic security features, like authentication when connecting to devices or pushing firmware updates.

Still, there were some great presentations, and most of them are available online. One worth checking out if you’re into the Internet of Things hacking -thing is Daniel Buentello’s (@danielbuentell0) presentation of “Weaponizing Your Coffee Pot.” This is a repeat performance for Daniel, who also presented it at the ToorCon Conference in Seattle back in July.

The first half of this talk is a high level overview of IoT and the security implications thereof. Mostly this is stuff you’ve read on this blog before. In the second half, Daniel goes down into the weeds on hacking a couple of classic IoT devices: Belkin’s WeMo IP enabled power outlet and Nest’s iconic thermostat.

Without getting into all the details (its worth watching if you’ve toyed with breaking into a smart object). The interesting stuff is looking at Daniel’s methodology for reverse engineering the software that runs these commercial developments. A couple points:

 

“Take things apart!” Buentello urged DerbyCon participants.

Check out the video below, and visit the DerbyCon site to learn more!

Exit mobile version