Practical LoRaWAN auditing and exploitation — ZeroNights 2019
Practical LoRaWAN auditing and exploitation

IoT deployments just keep growing, and one part of that significant growth is composed of millions of LPWAN (low-power wide-area network) sensors deployed at hundreds of cities (Smart Cities) around the world, also at industries and homes. One of the most used LPWAN technologies is LoRa, for which LoRaWAN is the network standard (MAC layer). LoRaWAN is a secure protocol with built-in encryption, but implementation issues and weaknesses affect the security of most current deployments.

While there is already prior research on LoRaWAN security, most of them focus on known protocol weakness and theory, none of them provides tools neither examples of common security problems of real deployments.

What’s more, currently, there are not guidelines neither tools to test the security of LoRaWAN networks, which means that if someone wants to audit a LoRaWan network, she has to start from scratch. Over the last year, we have been researching LoRaWAN to identify common security problems and building tools to test LoRaWAN network security.

In this talk, we are going to describe common security problems we found on LoRaWAN deployments. Also, we are going to provide step by step guidelines on how and what to test on LoRaWan networks indicating what hardware and software to use. Plus, we will be releasing new tools to test the security of LoRaWan networks. Finally, we are going to provide recommendations for secure LoRaWan deployments.

Cesar Cerrudo

Cesar Cerrudo

Cesar Cerrudo is a Chief Technology Officer for IOActive Labs, where he leads the team in producing ongoing, cutting-edge research in areas including Industrial Control Systems/SCADA, Smart Cities, the Internet of Things, Robots, Blockchain, Cryptocurrencies, and software and mobile device security. Cesar is a world-renowned cyber security researcher with more than 15 years of experience.

Esteban Martinez Fayo

Esteban Martinez Fayo

Esteban Martinez Fayo is a security researcher with more than 15 years of experience; he has discovered and helped to fix multiple security vulnerabilities in key enterprise software from major vendors like Oracle, Microsoft and IBM. As part of his research, he has developed and presented novel database attack techniques at international conferences such as Black Hat, DEFCON, EkoParty, WebSec and NcN. Throughout his career, Esteban has performed dozens of penetration tests and provided security advice for companies across a variety of industries.

Matías Sequeira

Matías Sequeira

Matías Sequeira started his career in cyber security field as an information security consultant where he worked for clients from the financial and medical software field. Later, he started to research about ransomware and defense measures against it, as part of the AntiRansomware Team. Currently, his research interests focus on IoT security.
Reports
Reports