Skip to main content

Making Raspberry Pi into IoT Pentesting Lab/Attacker Machine

Agenda : cover the max topics in the IoT Pentesting. we learn how to make attacker machine
and how to make target machine with Raspberry Pi

But if we are good at the understanding IoT Device no procedure we can attack all possible ways

So lets


Popular posts from this blog

Firmware analysis Basic Approach

OWASP IoT I9: Insecure Software/Firmware, But here Our main concern is Firmware.
Testing Methodology:• Get the firmware• Reconnaissance• Unpacking• Localize point of interest• Decompile/pentest/fun!What are the requirements i will explain step by step. Here i am using the Ubuntu Xenial 16.04 you can use which Linux is comfortable with you.
1.Binwalk 2.Strings 3.Hexeditor 4.Linux OS - Ubuntu or Any other 5.Vulnerable firmware
So here i am not attacking any device directly because for firmware you will get from the vendor site or you can find some firmware in index of some sites.
as shown below And follow the installation steps from the Github location some dependencies need to be install. Some of them i will show how to do and remaining check from here $sudo apt-get install binwalk

After installation in the Binwalk in my Linux operating OS so next strings already default many Linux system…

Dumping the Firmware from the device Using buspirate

One of the best way to get the firmware from the hardware

While doing penetration testing there are scenarios in which we need to dump the firmware from the devices.This method is typically used when there are no firmware’s available from vendor site. Today we are going to show you how to dump the firmware from an Wireless router Binatone DT 850W Software and hardware Requirements:
BuspirateUbuntu 16.04 or any other Linux machineFlashrom toolSOIC cable pin 8Buspirate connectors

This is a Wireless router from Binatone DT 850W which will be used as an example for dumping the firmware.
Let’s us Analyze the Inside Device.You can see IC chips like EEPROM, UART pins and Ralink CPU and also some OtherIC chips Let us focus mainly on the EEPROM chip (winbond W25Q16). What is EEPROM: EEPROM (also written E2PROM and pronounced “e-e-prom”, “double-e-prom” or “e-squared-prom”) stands for electrically erasable programmable read-only memory and is a type of non-volatile memory used in computers and other e…

Software Defined Radio

Software Defined Radio Part 1
SDR is Software defined Radio is used for the to Capturing and analyzing the various radio frequency signals , we can monitor and transmit the signals also , according to security reasons i am not showing transmission of open source signals but soon i will update how to pentest the replay attacks of key fobs and smart door lock systems.
what we going to discuss
1. Introduction about Radio And Software Defined Radio 2. Various types of devices 3. Antennas 4. Radio waves 5. Capturing the FM Signals And Analyzing

1. Software Defined Radio (SDR) 2. Antenna 3. GQRX software for Linux , windows - SDR software 4. Gnu Radio Companion 5. Computer

Radio is the technology of using radio waves to carry information, such as sound, by systematically modulating some property of electromagnetic energy waves transmitted through space, such as their amplitude, frequency, phase, or pulse width.(Wikipedia)