To the page content
T IoT

How penetration testing makes IoT devices more secure

More and more companies are relying on IoT devices! This makes it all the more important to protect all connected devices from unauthorised hacker access. This is where IoT penetration testing comes in. In this article, you will learn how it works and what stages it involves.

In brief

  • IoT penetration tests (pentests) secure networked devices by having experts simulate targeted hacker attacks to find vulnerabilities.
  • The entire ecosystem (hardware, network, cloud, apps) is tested for risks such as weak passwords or insecure data transmission.
  • The process consists of five phases: kick-off (planning), investigation, reporting, troubleshooting and final review.

What is a penetration test for IoT devices?

A Kaspersky study from last year shows that More than half of all companies worldwide rely on the Internet of Things (IoT) and artificial intelligence (AI). As more and more IoT devices are being used in companies, it is becoming increasingly important not to lose sight of IoT security. This is where companies rely on IoT penetration testing, i.e. a penetration test.

With IoT penetration testing, companies can check all connected devices and their communication protocols for potential cyber risks. In these tests, experts simulate specific attacks on IoT devices. Their goal is to identify existing vulnerabilities and then close them. This improves the security of all connected devices.

The devices include, for example:

  • Smart home
  • Thermostats
  • Lighting systems
  • Surveillance cameras
  • Smart locks

What does IoT actually mean?

The three letters IoT stand for the term "Internet of Things". This refers to a networked ecosystem of virtual and physical objects (e.g. sensors, actuators, devices). They exchange data via the communication network and then decide on a specific action. In addition to the classic IoT, there is also the Industrial Internet of Things (IIoT). This is a sub-area of the IoT that is specifically geared towards industry.

How does IoT penetration testing work?

The testing approach clearly differs from the vulnerability scan. The vulnerability scan is a vulnerability scanner that automatically identifies misconfigurations or programming errors. In IoT penetration testing, on the other hand, experts deliberately attempt to exploit vulnerabilities in order to assess potential risks. In the case of IoT, the rule is: companies do not test a single piece of software or databases, but a complex system consisting of several pieces of the puzzle.

The IoT pentest examines each of these pieces of the entire IoT ecosystem:

  • IoT device  (hardware and firmware)
  • Radio/network connection (e.g. mobile/LPWAN, WLAN)
  • Backend & cloud services
  • Web/mobile applications
  • Application programming interfaces (APIs)
  • Different fields of application or operating scenarios of the IoT device

For special embedded systems, companies rely on so-called embedded penetration testing. This is used primarily in medical devices, industrial control systems or in cars.

The two penetration tests overlap at certain points but also show differences. An IoT pentest is more broadly based and covers the entire IoT architecture, whereas an embedded test goes more into depth. It specialises in the security of the hardware and firmware.

Similar use case or any questions?

Simply fill out the contact form – we’ll get back to you as soon as possible.

Which security risks does IoT penetration testing eliminate?

With an IoT penetration test, companies can uncover various security risks without additional effort. These include, for example:

  • Weak passwords: Weak passwords are considered one of the biggest security gaps and attack surfaces for brute-force attacks. With IoT penetration testing you can specifically detect and change problematic passwords. This way you already close major security loopholes.
  • Insecure data storage or transmission: In practice, it still happens that companies do not use end-to-end encryption for data or rely on outdated protocols. This is particularly critical for resource-constrained IoT endpoints, whose hardware often only supports limited security functions. A point that hackers are happy to exploit.
  • Outdated updates: One of the biggest security tips is always: keep your software up to date. But you must not forget that updates also differ. Some of them may actually harm the system rather than help it. This should of course be avoided. You should therefore rely on a secure update mechanism and always use secure connections for the process. Also make sure that hackers cannot undo existing updates.
  • Insecure network services & protocols: An IoT implementation without an internet connection? For some companies no longer imaginable! An IoT pentest can help you identify all vulnerabilities at the network level – from incorrect configuration to insecure protocols. Often TLS/DTLS, authentication, clean broker configurations, anonymous access and DoS vulnerabilities are missing. The aim of IoT penetration testing is to determine to what extent data can be compressed.

What are the 5 phases of the IoT pentest?

IoT penetration testing is a complex process that can be divided into 5 phases.

Phase 1: Kickoff

IoT penetration testing begins with a kick-off discussion. In this meeting you and the expert develop clear security concepts, define the objectives, scope and rules of engagement. Open questions can already be clarified in advance. These include:

  • Which components are the focus (device/firmware, radio & network, cloud/backend, apps & APIs)?
  • Which security objectives are you pursuing?
  • Within which framework (black/grey/white box) should the expert examine the systems?
  • Should the IoT pentest be carried out on site or remotely?
  • Which approvals/test windows apply – and what is out of scope (e.g. productive DoS tests)?

The duration of IoT penetration testing depends largely on these answers! Once the expert has all the important information, they can give you an approximate timeframe. After the kick-off discussion you will have an agreed test plan in your hands. Ideally, you should start IoT penetration testing already at an early stage of development. 

 

Phase 2: Detailed security investigatio

Once the expert has all the necessary information, they carry out a detailed security investigation in phase 2. They uncover vulnerabilities in the system and immediately present you with suitable solutions. In addition, the expert takes into account the respective operating and application environment of the IoT system in order to simulate realistic attack scenarios. This is of course somewhat roughly described – but deliberately so. Unfortunately, the course of such an IoT penetration test cannot be described in detail. Why? Because it depends on the application.

Are they, as a result of an IoT pentest, examining the front end of a web application? Then they will probably attack the application with malicious JavaScript or check the source code for insecure programming patterns to identify security gaps. Phase 2 is a very detailed step of IoT penetration testing. It involves detailed analyses that are individually tailored to your application. This allows the expert to take a close look at your systems.


Phase 3: Report

In the third phase the expert hands you a report on the IoT pentest. There you will find all identified vulnerabilities as well as appropriate countermeasures. In addition to this information, you will also receive a comprehensive overview of the tools used and the methodology applied.

 

Phase 4: Remediation

You now know where the problems lie. In the fourth phase you initiate all steps to remedy the potential attack surfaces. Often the experts of IoT penetration testing also support you in this phase. They give you helpful tips and recommendations to ensure that everything is carried out securely.


Phase 5: Re-testing

After you have remedied all vulnerabilities, a re-test is carried out. Together with the expert, you check whether you have really closed all the gaps found in phase 2. At the same time, in this phase the expert looks to see whether the adjustments could have created new attack vectors. You will then receive a new report, either with the note “remedied” or “not remedied”, as well as clear action steps.

The expert often concludes with a further discussion. There you will receive important advice on how to protect your IoT devices and systems in the future. One thing is certain: the errors found should not occur again! So they will talk to you about the implementation of automated security systems as well as the regular training of your employees.

IoT Connectivity

A satellite orbits the Earth, surrounded by pink and blue data streams for global IoT connectivity

IoT Connectivity

The right IoT connectivity coordinates IoT connections across platforms, integrates devices and data via API, and enables global control with the highest security standards. You can manage your IoT projects flexibly, efficiently, and independently of manufacturers.

Potrait photo Vanessa Wölk

Vanessa Wölk

Marketing Manager IoT

Vanessa has been an integral part of the Deutsche Telekom IoT team since 2024. In her IoT blog, she showcases use cases and success stories that demonstrate how companies can achieve measurable benefits with IoT.

IoT security: recognising and closing security gaps

In modern companies, more and more devices are communicating with each other in real time. However, the stronger the networking, the greater the attack surface, as every IoT device is a potential gateway into the company network. Find out here what risks exist and how you can protect your systems effectively.

Read article

IoT Governance in Companies: Combining Control, Security and Compliance

The Internet of Things (IoT) is changing how companies collect data, control processes and develop new services. IoT Governance is intended to form the strategic foundation for transparency, control and trust in an increasingly digital infrastructure. How this works, you will find out here.

Read article

IoT networks: functions, selection and examples

IoT networks form the basis of smart applications. They connect machines, sensors and systems and transmit data reliably. Range, energy consumption and data security are decisive factors when choosing the right IoT network. This article shows network technologies, project suitability and selection criteria.

Read article