IoT Security Vulnerabilities: Smart Lighting System and Baby Monitor

AdroitZither avatar
AdroitZither
·
·
Download

Start Quiz

Study Flashcards

39 Questions

What is the purpose of the SLS handshake step 3?

To prove that the user has physical access to the bridge

What does the 'Access-Control-Allow-Origin: *' in the server response header indicate?

It allows access from any origin, including local networks

Which component of the Smart Lighting System (SLS) communicates with the Philips Cloud?

Philips Bridge

What is the main purpose of the SLS Handshake step 1?

To create a user account

What is the potential risk associated with the 'Access-Control-Allow-Origin: *' setting in the server response header?

Unauthorized access from any origin, including local networks

Which step of the SLS Handshake involves associating the bridge with the user account?

Step 2

What technology does the Philips Bridge use to communicate with the Home Network?

ZigBee

What is the purpose of the Smart Lighting System (SLS) Vulnerabilities section?

To highlight potential security risks associated with SLS

What happens when the user presses the button on the bridge during the SLS Handshake?

Proof of physical access to the device is provided

What was the first baby monitoring system based on?

Radio waves

What is the main concern for parents/guardians regarding baby monitor appliances?

Eavesdropping

What vulnerability was reported for Foscam baby monitor at the 'Hack in the Box' conference?

Access to username and password

What does the Shodan search engine help find over the internet?

Unprotected and vulnerable devices like Foscam baby monitor

How do Foscam devices update their hostname mapping?

Sending a UDP packet to a server owned by Foscam

How can an attacker exploit the knowledge of Foscam device hostname ranges?

Invoke phishing attacks

What type of systems are later models of baby monitors like Foscam and WeMo based on?

IoT-based systems

What is the security concern with modern baby monitoring systems using WiFi?

Increased risk of eavesdropping

Which protocol is used by Foscam devices to update their hostname mapping?

User Datagram Protocol (UDP)

What is the risk factor associated with knowing the IP address of a Foscam device according to the text?

Access to the kcore file containing username and password

The SLS Handshake step 3 involves proving physical access to the bridge by pressing a button.

True

The POST request sent by the bridge during the SLS Handshake is used to verify that the user has physical access to the device.

True

The 'Access-Control-Allow-Origin: *' setting in the server response header poses a potential risk of capturing SLS information from the victim's local network.

True

The Smart Lighting System (SLS) communicates with the Philips Cloud using a wired connection (Ethernet).

False

The bridge sends a Setup Complete message to the backend after the user proves physical access during the SLS Handshake.

True

The SLS Handshake step 2 involves associating the bridge with the user account.

True

The SLS Handshake step 1 is to create a user account.

True

The server response header includes an 'Authorization' field with details such as SSOToken and Authentication.

True

The victim can visit a website from his local network to capture SLS information due to the 'Access-Control-Allow-Origin: *' setting in the server response header.

True

The SLS Vulnerabilities section mainly discusses potential risks and weaknesses of the Smart Lighting System (SLS).

True

Foscam and WeMo are examples of IoT-based baby monitoring systems.

True

Eavesdropping is a significant concern for parents/guardians using baby monitor appliances.

True

Modern baby monitoring systems using WiFi are less vulnerable to eavesdropping compared to radio wave monitoring systems.

False

Foscam baby monitor was reported to be vulnerable to attacks once its IP address is known.

True

Shodan search engine can help find unprotected and vulnerable devices like Foscam baby monitor over the internet.

True

Foscam default password is enforced to be changed by the user upon setup.

False

Foscam devices use User Datagram Protocol (UDP) to update their hostname mapping.

True

The UDP packet sent by Foscam devices contains the username and password associated with the device.

True

An attacker can exploit the knowledge of Foscam device hostname ranges to execute phishing attacks.

True

Guardian Ear was the first baby monitoring system based on Radio Waves.

True

Explore the security vulnerabilities in IoT devices like Smart Lighting Systems (SLS) and Baby Monitors. Learn about SLS handshakes, user registration protocols, and potential exploits in the system. Understand the risks associated with IoT devices and how to mitigate them.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

IoT Security Infrastructure Quiz
3 questions
IoT Security: Abusing Smart Lighting Systems
15 questions
IoT Devices and Sensors Quiz
12 questions

IoT Devices and Sensors Quiz

StimulativeMahoganyObsidian avatar
StimulativeMahoganyObsidian
Use Quizgecko on...
Browser
Browser