We are security researchers from the Design and Analysis of
Communication Systems (DACS) group at Faculty of
Electrical Engineering, Mathematics and Computer Science (EEMCS) at the
University of Twente. Our research project is funded by the INTERSCT, the cybersecurity project in the Netherlands.
If you reach this site for the recent email notice regarding MQTT, CoAP, and XMPP, please check on the page
below. You can find more details about how we conducted the experiment and collected the data.
https://iotscan.eemcs.utwente.nl/
To responsibly disclose our findings, we follow the Coordinated
Vulnerability Disclosure policy of the
University of Twente and work with the National Cyber Security Center (NCSC) for the disclosure process. To
reach out to us, please contact the email address below:
iot-disclosure-2023@utwente.nl
Scanning Methodology
The following methods have been used in scanning and detecting vulnerabilities:
MQTT
- Topic Enumeration: In case of a successful connection with the endpoint, we subscribe to the wildcards # and $SYS/#. We then collect all the incoming topic names.
- Extract Number of Connected Clients and Broker Version: while in general, we discard all payloads to avoid ethical issues, we do collect some $SYS/# payloads, which give us relevant information for endpoint fingerprinting and security analysis, e.g., the broker version or the number of connected clients.
CoAP
- Enumeration of Resources via HEAD Request: we compile a list of 30 resources we check for. We perform a HEAD request for each resource and wait for the return code. We mark the resource as available if we receive return codes 2.05 (Content) or 2.03 (Valid).
- Extract Server Version: Cotopaxi allows us to check the adopted library and version for the CoAP server.
XMPP
- Extract Server Version, Features, Capabilities, and Authentication Mechanisms: nmap allows us to extract all the information for XMPP servers, including adopted authentication mechanisms and supported capabilities (e.g., TLS). We then check which authentication mechanisms are broken or insecure.