IoT Penetration Testing

Attack vector verification for IP-enabled business devices

IoT security is a significant challenge that requires the security assessment of numerous vectors. These range from web interfaces, software and firmware configuration settings and network services to mobile interfaces, transport encryption, cloud interfaces and privacy concerns in general. Each element should be addressed individually and together as a whole.

Risk Crew Deliverables

Our service provides a comprehensive report of our findings and remedial recommendations. The report will detail vulnerabilities identified with IoT systems, the methodologies and tools used to attempt to exploit the vulnerabilities and the results of these attacks.

Risk Crew’s all-encompassing service includes a courtesy workshop and on-call assistance.

Detailed Report

The report details specific vulnerabilities identified on the platform, how they were identified, methods and tools used to identify them and visual evidence if applicable. The report shall indicate a security vulnerability risk rating for risk reduction references.

Stakeholder Workshop

The report is presented in a workshop with applicable business stakeholders to ensure their understanding of the findings and the risks associated with hosting the business information assets on the platform.

On-call Advice Assistance

We provide advice and assistance for 30 days following the report submittal and answer any questions that arise from implementing remedial actions and ensuring risk reduction.

Transparent Pricing

Our fixed pricing services come with no unexpected added costs. Additionally, we offer a managed service to conduct penetration testing on a continual basis.

Retesting Included

We offer retesting to verify remedial actions were effective. Upon completion, we’ll provide you a summary report verifying remedial measures have been implemented.

Customer Promise

Risk Crew provides an unparalleled penetration testing solution covered by a 100% satisfaction guarantee.

IoT Security Penetration Testing Benefits
Identifying IoT weakness and conducting remediations can help with:
Strengthening device security
Avoiding elevation of privileges
Improve user and data privacy
Protecting against unauthorised usage
Reducing the risk of compromise
Strengthening encryption to avoid man-in-the-middle attacks

Why Choose Risk Crew

Best Practice Risk Crew follows best practices including OWASP and NIST
Accredited & Certified Engineers carry CREST, C√SS, C│EH and GIAC credentials. They also hold CISSP, CISM and CRISC certifications
Subject Matter Experts Risk Crew engineers are SMEs with published articles in industry journals & magazines

FAQs

IoT or “internet of things” technology is comprised of interconnected mechanical, digital or computing devices or objects equipped with unique identifiers (UIDs) able to transfer data over (an IP enabled network) without human interaction.

An “IoT attack surface” is the total of all potential security vulnerabilities associated with the IoT devices and associated hardware, software and firmware in an IoT network.

An IoT vulnerability is a security weakness in the configuration or deployment of an IoT device that if exploited, could cause disruption, reveal data or provide unauthorised access to connected systems.

IoT devices deployed in a business may provide an unidentified cyber-attack vector to your business systems and information. Business can overlook device connectivity as an attack vector with devastating results. It serves to remember that in 2013 attackers accessed Target payment systems through heating and cooling system connections and removed over 40 million cardholder details.

Request a Security Testing Quote

Contact Us