Accueil SSI audit Hardware penetration testing

Hardware penetration testing

Identify security flaws in the components of your devices.

Eliminate technological grey areas

A distinction should be made between two types of hardware pentest:

Pentesting a workstation :

The aim is not to test the robustness of the equipment, but to identify intrinsic weaknesses linked to its design.

In this case, the customer is not the manufacturer of the audited workstation, and therefore has no precise knowledge of its hardware design.

Workstation pentesting enables risk analysis to be adapted to take account of new potential threats linked to the hardware in use.

Pentest IoT :

In the case of IoT pentesting, the customer may be the designer of the equipment to be audited, or he may wish to have an analysis carried out on one or more off-the-shelf devices.

The purpose of the audit is to assess the robustness of the product in the face of known attacks, with the aim of strengthening its security and improving its design if the customer is the designer.

If the customer has purchased an off-the-shelf product, the purpose of the audit is to highlight the risks associated with using the equipment , or to offer a safety trade-off if the customer wishes to choose between several pieces of equipment.

Discover the benefits of hardware intrusion testing

Pentesting a workstation :

Pentest IoT:

Rely on a rigorous, proven approach

Pentesting a workstation :

Workstation pentesting is always carried out in black box mode, as the customer has no technical information on the design of the hardware being audited. This is the scenario of a lost or stolen workstation.

To meet this requirement, a specific methodology was developed, as illustrated in the following diagram.

One of the main challenges of this type of audit is the risk of data destruction or loss.

Being in a black box, the auditors have no useful information on the equipment used or the location of the various components. The documentary research phase will help to remedy this.

However, the methodology also takes into account cases where no information is available, thus minimizing the risk of destruction, while ensuring a good level of analysis.

Pentest IoT:

The audit can therefore be carried out in black, gray or white boxes, depending on the information shared.

However, the audit begins systematically in black box mode, in order to simulate the real conditions of an attack carried out without any prior knowledge of the hardware.

The methodology used differs slightly from that applied to substation pentesting. The diagram below illustrates the specific steps involved in an IoT audit.

Unlike substation pentesting, where only two outcomes are possible (total compromise or failure), IoT pentesting can result in a partial level of compromise.

For example, reading and analyzing the firmware may reveal sensitive information, without actually modifying the system’s behavior.

A total compromise is considered to have occurred when modified firmware can be injected and executed on the equipment, thus enabling it to bypass its main function.

Hardware pentest feedback

If you’d like to find out more about how to carry out this type of intrusion test, you can read the article on a successful hardware intrusion test by Samuel Marrazzo and Louis Distel by clicking here.

Are you planning an audit?
Pentest
Architecture
Configuration
Red Team
Social Engineering
Organizational and Physical
Source code

Incident response

CERT contact details

Mail: cert@synetis.com

Telephone: 02 30 21 31 04

USER ID : CERT SYNETIS

KEY ID : 2F6F A FE30 7877

PGP key fingerprint: 8D8ACAAC20557C7C1FF58332F6FA110FE307877

CERT Synetis is in the process of obtaining PRIS (Prestataires de Réponse aux Incidents de Sécurité) qualification from ANSSI (the French national agency for security incident response).

Incident response

CERT contact details

Mail: cert@synetis.com

Telephone: 02 30 21 31 04

USER ID : CERT SYNETIS

KEY ID : 2F6F A FE30 7877

PGP key fingerprint: 8D8ACAAC20557C7C1FF58332F6FA110FE307877

CERT Synetis is in the process of obtaining PRIS (Prestataires de Réponse aux Incidents de Sécurité) qualification from ANSSI (the French national agency for security incident response).

Contact our Audit team