Skip to main content

Posts

Showing posts from 2020

Some IoT Pentesting hints -- keep on update

Procedure 1 :

A. Collect the information about the device
i.data sheets
ii.product features
iii.installation guide and user manual download from the vendor

    website or use google dorks to get the data

B. as per device name and model number or hardware information check for publicly
available exploits -exploit db , or exploit search engines
Useful search engines for the exploits

https://sploitus.com/
https://vulmon.com/
http://www.exploitsearch.com/
https://www.nmmapper.com/searchindex/s/

There are special search engines for IoT which helps us to find the more insecure devices which is publicly available
 i . shodan
 ii. censys
 iii. zoomeye
 iv. onphye

C. Making a detailed list
    i. Write all features list of the device
    ii. Make list publicly available exploits
    iii.Start making your own method to pentest it -

            before that understand device more clearly

D.Common approach for the IoT Pentesting Methodology
     i.Network
     ii.embedded applications
     iii.mobile apps Android and ios
  …

Bluetooth Pentesting guide

Just interesting in daily life that we cant see properly called signals that we can't see with our own eyes

but devices can do there many wireless communication are there like
Wireless Communication protocols in IoT:wifi (wireless fidelity)bluetooth zigbeezwave LoRAGSMBut let's get into the topic Mostly relevant  vulnerabilities in Bluetooth: Authentication and authorisation issuesMiTMDoSMAC SpoofingPIN CrackingBrute forceIn android Bluetooth mostly we will get this type vulnerability:RCE        Remote code executionEoP        Elevation of privilegeID         Information disclosureDoS        Denial of serviceIn major level Bluetooth chipset vulnerabilitiesWe all same procedure what scan the surrounding devices and start attacks from the write-ups available in google

Let’s see little difference right now we need to know how Bluetooth works