mirror of
https://github.com/The-Art-of-Hacking/h4cker.git
synced 2024-12-17 19:54:36 -05:00
.. | ||
flags.md | ||
README.md | ||
wireless_iot.md |
Internet of Things (IoT) Hacking Resources
The Internet of Things (IoT) Hacking Resources refer to an array of tools and frameworks used to ensure the security of IoT devices and networks.
Analysis Frameworks
- EXPLIoT: This is a penetrating testing framework that is akin to Metasploit, but it specifically caters to Internet of Things (IoT) applications.
- FACT - The Firmware Analysis and Comparison Tool: A comprehensive static analysis tool that specializes in firmware extraction, plugin-facilitated analysis, and comparison between different firmware versions. To understand more, watch this conference talk discussing enhancements in the firmware security analysis process using FACT.
- FwAnalyzer: Designed to evaluate firmware security via customized rule-based analysis. It's an excellent complementary step in DevSecOps, analogous to Continuous Integration (CI) in function.
- HAL – The Hardware Analyzer: An all-encompassing reverse engineering tool that provides a manipulation framework for gate-level netlists.
- HomePWN: Consider it your Swiss Army Knife for penetration testing of IoT devices.
- IoTSecFuzz: This framework automates the security analysis of IoT layers, including hardware, software, and communication.
- Killerbee: An established framework for the testing and auditing of ZigBee and IEEE 802.15.4 networks.
- PRET: The go-to toolkit for printer exploitation.
- Routersploit: A dedicated framework specifically designed to exploit embedded devices.
Advanced Tools for Binary and Firmware Analysis
- Binwalk: This powerful tool delves into binaries to identify "interesting" elements and also facilitates the extraction of arbitrary files.
- emba: Designed specifically to analyze the Linux-based firmware of embedded devices, emba provides a comprehensive framework for firmware scrutiny.
- Firmadyne: This resource aims to emulate and conduct penetration tests on various firmwares, providing a simulation environment for security testing.
- Firmwalker: This tool specializes in exploring extracted firmware images, searching for relevant files and information.
- Firmware Slap: A unique tool for discovering vulnerabilities in firmware through the method of concolic analysis and function clustering.
- Ghidra: Ghidra is a comprehensive Software Reverse Engineering suite. It can manage arbitrary binaries when provided with the CPU architecture and endianness of the binary.
- Radare2: This is a versatile Software Reverse Engineering framework. Capable of handling popular formats and arbitrary binaries, it boasts an extensive command line toolkit.
- Trommel: Trommel conducts a detailed search through extracted firmware images, hunting for relevant files and intriguing information.
Tools for Firmware Extraction and Manipulation
- FACT Extractor: This intelligent tool identifies container formats automatically and triggers the appropriate extraction tool, thereby streamlining the process.
- Firmware Mod Kit: This kit provides a range of extraction tools compatible with various container formats, offering a versatile solution for firmware modification.
- The SRecord package: This package encompasses a suite of tools for manipulating EPROM files. Its functionality includes the ability to convert numerous binary formats, providing an essential resource for binary file conversion and manipulation.
- JTAGenum - Add JTAG capabilities to an Arduino.
- OpenOCD - Free and Open On-Chip Debugging, In-System Programming and Boundary-Scan Testing.
Misc Tools
- Cotopaxi - Set of tools for security testing of Internet of Things devices using specific network IoT protocols.
- dumpflash - Low-level NAND Flash dump and parsing utility.
- flashrom - Tool for detecting, reading, writing, verifying and erasing flash chips.
- Samsung Firmware Magic - Decrypt Samsung SSD firmware updates.
Hardware Tools
- Bus Blaster - Detects and interacts with hardware debug ports like UART and JTAG.
- Bus Pirate - Detects and interacts with hardware debug ports like UART and JTAG.
- GreatFET One - If you need an interface to an external chip, a logic analyzer, a debugger, or just a whole lot of pins to bit-bang, the versatile GreatFET One is the tool for you.
- Shikra - Detects and interacts with hardware debug ports like UART and JTAG. Among other protocols.
- JTAGULATOR - Detects JTAG Pinouts fast.
- Saleae - Easy to use Logic Analyzer that support many protocols 💶.
- Ikalogic - Alternative to Saleae logic analyzers 💶.
- HydraBus - Open source multi-tool hardware similar to the BusPirate but with NFC capabilities.
- ChipWhisperer - Detects Glitch/Side-channel attacks.
- Glasgow - Tool for exploring and debugging different digital interfaces.
- J-Link - J-Link offers USB powered JTAG debug probes for multiple different CPU cores 💶.
Bluetooth BLE Tools
- UberTooth One - Open source 2.4 GHz wireless development platform suitable for Bluetooth experimentation.
- Bluefruit LE Sniffer - Easy to use Bluetooth Low Energy sniffer.
ZigBee Tools
- ApiMote - ZigBee security research hardware for learning about and evaluating the security of IEEE 802.15.4/ZigBee systems. Killerbee compatible.
- Atmel RZUSBstick - Discontinued product. Lucky if you have one! - Tool for development, debugging and demonstration of a wide range of low power wireless applications including IEEE 802.15.4, 6LoWPAN, and ZigBee networks. Killerbee compatible.
- Freakduino - Low Cost Battery Operated Wireless Arduino Board that can be turned into a IEEE 802.15.4 protocol sniffer.
SDR Tools
- RTL-SDR - Cheapest SDR for beginners. It is a computer based radio scanner for receiving live radio signals frequencies from 500 kHz up to 1.75 GHz.
- HackRF One - Software Defined Radio peripheral capable of transmission or reception of radio signals from 1 MHz to 6 GHz (half-duplex).
- YardStick One - Half-duplex sub-1 GHz wireless transceiver.
- LimeSDR - Software Defined Radio peripheral capable of transmission or reception of radio signals from 100 KHz to 3.8 GHz (full-duplex).
- BladeRF 2.0 - Software Defined Radio peripheral capable of transmission or reception of radio signals from 47 MHz to 6 GHz (full-duplex).
- USRP B Series - Software Defined Radio peripheral capable of transmission or reception of radio signals from 70 MHz to 6 GHz (full-duplex).
RFID NFC Tools
- Proxmark 3 RDV4 - Powerful general purpose RFID tool. From Low Frequency (125kHz) to High Frequency (13.56MHz) tags.
- ChamaleonMini - Programmable, portable tool for NFC security analysis.
- HydraNFC - Powerful 13.56MHz RFID / NFC platform. Read / write / crack / sniff / emulate.
Free Training
- CSAW Embedded Security Challenge 2019 - CSAW 2019 Embedded Security Challenge (ESC).
- Hardware Hacking 101 - Workshop @ BSides Munich 2019.
- IoTGoat - IoTGoat is a deliberately insecure firmware based on OpenWrt.
- Rhme-2015 - First riscure Hack me hardware CTF challenge.
- Rhme-2016 - Riscure Hack me 2 is a low level hardware CTF challenge.
- Rhme-2017/2018 - Riscure Hack Me 3 embedded hardware CTF 2017-2018.
Websites
- Hacking Printers Wiki - All things printer.
- OWASP Embedded Application Security Project - Development best practices and list of hardware and software tools.
- OWASP Internet of Things Project - IoT common vulnerabilities and attack surfaces.
- Router Passwords - Default login credential database sorted by manufacturer.
- Siliconpr0n - A Wiki/Archive of all things IC reversing.
Blogs
- RTL-SDR
- /dev/ttyS0's Embedded Device Hacking
- Exploiteers
- Hackaday
- jcjc's Hack The World
- Quarkslab
- wrong baud
- Firmware Security
- PenTestPartners
- Attify
- Patayu
- GracefulSecurity - Hardware tag
- Black Hills - Hardware Hacking tag
Tutorials and Technical Background
- Azeria Lab - Miscellaneous ARM related Tutorials.
- JTAG Explained - A walkthrough covering UART and JTAG bypassing a protected login shell.
- Reverse Engineering Serial Ports - Detailed tutorial about how to spot debug pads on a PCB.
- UART explained - An in depth explanation of the UART protocol.
OWASP Resources
IoT Hacking Communities
Training Available Through ICS-CERT
Interesting Blogs
- http://iotpentest.com/
- https://blog.attify.com
- https://payatu.com/blog/
- http://jcjc-dev.com/
- https://w00tsec.blogspot.in/
- http://www.devttys0.com/
- https://www.rtl-sdr.com/
- https://keenlab.tencent.com/en/
- https://courk.cc/
- https://iotsecuritywiki.com/
- https://cybergibbons.com/
- http://firmware.re/
CTFs Related to IoT's and Embedded Devices
- https://github.com/hackgnar/ble_ctf
- https://www.microcorruption.com/
- https://github.com/Riscure/Rhme-2016
- https://github.com/Riscure/Rhme-2017
YouTube Channels for Embedded hacking
Reverse Enginnering Tools
MQTT
- Introduction
- Hacking the IoT with MQTT
- thoughts about using IoT MQTT for V2V and Connected Car from CES 2014
- Nmap
- The Seven Best MQTT Client Tools
- A Guide to MQTT by Hacking a Doorbell to send Push Notifications
CoAP
Automobile
- Introduction and protocol Overview
- PENTESTING VEHICLES WITH CANTOOLZ
- Building a Car Hacking Development Workbench: Part1
- CANToolz - Black-box CAN network analysis framework
Radio IoT Protocols Overview
- Understanding Radio
- Signal Processing
- Software Defined Radio
- Gnuradio
- Creating a flow graph
- Analysing radio signals
- Recording specific radio signal
- Replay Attacks
Base transceiver station (BTS)
GSM & SS7 Pentesting
- Introduction to GSM Security
- GSM Security 2
- vulnerabilities in GSM security with USRP B200
- Security Testing 4G (LTE) Networks
- Case Study of SS7/SIGTRAN Assessment
- Telecom Signaling Exploitation Framework - SS7, GTP, Diameter & SIP
- ss7MAPer – A SS7 pen testing toolkit
- Introduction to SIGTRAN and SIGTRAN Licensing
- SS7 Network Architecture
- Introduction to SS7 Signaling
Zigbee & Zwave
- Introduction and protocol Overview
- Hacking Zigbee Devices with Attify Zigbee Framework
- Hands-on with RZUSBstick
- ZigBee & Z-Wave Security Brief
BLE
-
BLE Characteristics Reconnaissance (Active and Passive) with HCI Tools
Mobile security (Android & iOS)
ARM
Firmware Pentest
IoT hardware Overview
Hardware Tools
- Bus Pirate
- EEPROM readers
- Jtagulator / Jtagenum
- Logic Analyzer
- The Shikra
- FaceDancer21 (USB Emulator/USB Fuzzer)
- RfCat
- IoT Exploitation Learning Kit
- Hak5Gear- Hak5FieldKits
- Ultra-Mini Bluetooth CSR 4.0 USB Dongle Adapter
- Attify Badge - UART, JTAG, SPI, I2C (w/ headers)