We propose and demonstrate an IoT Honeypot framework based on the open source automatedmalware analysis system Cuckoo Sandbox [3] that’s capable of emulating such IoT devices. By attaching the emulated IoT instance(s) to the internet, either in internal networks or using public IP addresses, an attacker may decide to target their campaign at the emulated IoT devices, allowing our IoT Honeypot to detect & analyze the payloads and attack methods. The IoTHoney framework allows organizations to run IoT-focused honeypots tailored to their organization.

Presentation

Presentation Pieter Jansen Jurriaan Bremer

Details

time: 12:20
speakers: Pieter Jansen, Jurriaan Bremer

Other sessions:

Constraints for Code: an Economic Analysis of Policies for Secure Digital Products


Disrupting Financial Cybercrime


Digital disease: clinical simulations of hacked devices


Let’s go Dutch – DCB + NBIP


Modern Pentest Tricks