After completing a threat model and a source code analysis, a dynamic penetration test of the IoT device and the associated network is conducted. Dynamic penetration testing of the IoT device may include hardware testing, evaluation of various communication protocols, and exploration of relevant attack scenarios.
Certus Cybersecurity has extensive expertise in hardware security testing. The services provided include hardware-level testing of chips, verifying access achieved via debug ports, side-channel attacks, power analysis, and firmware analysis. These testing activities will result in a list of action items to improve the hardware product’s security posture.
Certus Cybersecurity provides security testing services on a wide range of communication protocols in the IoT space, such as SDR, Wi-Fi, Bluetooth Low Energy (“BLE”), ZigBee, MQTT, AMQP, and LoRA, to name a few. Certus Cybersecurity focuses on five applicable attacking scenarios, including sniffing and passive eavesdropping, man-in-the-middle attacks, denial-of-service, fuzzing attacks, and authentication attacks. The results of these activities provide specific recommendations to harden the communication protocols used by the device and its components.