Internet of Things Top Ten 2014-OWASP
Internet of Things Top Ten 2014-OWASP
Top Ten
Agenda
- Introduction
- Misconception
- Considerations
- The OWASP Internet of
Things Top 10 Project
- The Top 10 Walkthrough
26 Billion
by 2020
Account Enumeration
Weak Default Credentials
Credentials Exposed in Network Traffic
Cross-site Scripting (XSS)
SQL-Injection
Session Management
Account Lockout
I2 | Insufficient Authentication/Authorization
Vulnerable Services
Buffer Overflow
Open Ports via UPnP
Exploitable UDP Services
Denial-of-Service
DoS via Network Device Fuzzing
I5 | Privacy Concerns
Account Enumeration
No Account Lockout
Credentials Exposed in Network
Traffic
Account Enumeration
No Account Lockout
Credentials Exposed in Network
Traffic
I9 | Insecure Software/Firmware
Resources
Email List