Internet of Things Assessment

The Internet of Things describes various everyday objects or industrial machines that are connected to the Internet. These (“smart”) devices usually act automatically and autonomously, collecting information about themselves and their environment and sending it to other networked devices for evaluation. Many of the networked devices also provide the user with a web application that allows the devices to be operated and controlled from any location.

Testing Internet of Things (IoT) devices differs in some aspects from classical penetration testing. In an IoT assessment, several types of penetration tests are usually performed. This is because an IoT environment consists of several components such as a mobile application and possibly a web application, a backend (cloud) and a gateway.

In the IoT Assessment we conduct, all areas of the IoT environment are examined for vulnerabilities using penetration testing (simulated hacker attacks). The exact form of the analysis is determined individually.

We assist you:

  • Information procurement: Identification of the installed hardware components and interfaces
  • Analysis of common device interfaces such as UART, JTAG, SWD, USB

  • Analysis of the memory chip (readout of firmware and sensitive data)

  • Analysis of the network communication (Bluetooth Low Energy, ZigBee, WLAN, MQTT, HTTP(S), TCP, …) as well as scanning of the target object and identification of its services.

  • Check of the web application of the device according to the description “Web Application Security Pentest“.
  • Brute-force of login services, as well as password cracking of possible password hashes in our graphics card cluster
  • Checking the mobile app according to the instructions in “Mobile Application Security Pentest“.
  • Search for known vulnerabilities and configuration errors as well as validation and exclusion of false positives
  • Recherche nach bekannten Verwundbarkeiten und Konfigurationsfehlern sowie Validierung und Ausschluss von False-Positives
  • Detailed results report with proposed measures in the format you prefer

Wenn Sie auf der Seite weitersurfen, stimmen Sie der Cookie-Nutzung zu.
If you continue to visit the site, you agree to the use of cookies.
Privacy Policy / Cookie Policy

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close