mirror of
https://github.com/V33RU/awesome-connected-things-sec.git
synced 2026-04-10 12:33:45 +00:00
Update README.md
This commit is contained in:
committed by
GitHub
parent
b8cab6113c
commit
0033aec515
58
README.md
58
README.md
@@ -99,53 +99,49 @@ Approach Methodology
|
||||
- [Recording specific radio signal](https://www.rtl-sdr.com/freqwatch-rtl-sdr-frequency-scanner-recorder/)
|
||||
- [Replay Attacks](https://www.rtl-sdr.com/tutorial-replay-attacks-with-an-rtl-sdr-raspberry-pi-and-rpitx/)
|
||||
|
||||
|
||||
#### Zigbee
|
||||
Introduction and protocol Overview
|
||||
Reconnaissance (Active and Passive)
|
||||
Sniffing and Eavesdropping
|
||||
Replay attacks
|
||||
Hands-on with RZUSBstick and open source tools
|
||||
- [Introduction and protocol Overview](http://www.informit.com/articles/article.aspx?p=1409785)
|
||||
- [Hacking Zigbee Devices with Attify Zigbee Framework](https://blog.attify.com/hack-iot-devices-zigbee-sniffing-exploitation/)
|
||||
- [Hands-on with RZUSBstick](https://uk.rs-online.com/web/p/radio-frequency-development-kits/6962415/)
|
||||
|
||||
#### BLE(http://www.diva-portal.org/smash/get/diva2:833159/FULLTEXT01.pdf)
|
||||
- [Introduction and protocol Overview]
|
||||
- [BLE Characteristics](https://devzone.nordicsemi.com/tutorials/b/bluetooth-low-energy/posts/ble-characteristics-a-beginners-tutorial0)
|
||||
- Reconnaissance (Active and Passive) with HCI Tools
|
||||
- [btproxy](https://github.com/conorpp/btproxy)
|
||||
- [hcitool & bluez](https://www.pcsuggest.com/linux-bluetooth-setup-hcitool-bluez)
|
||||
- [Testing With GATT Tool](https://www.jaredwolff.com/blog/get-started-with-bluetooth-low-energy/)
|
||||
- [Introduction and protocol Overview]
|
||||
- [BLE Characteristics](https://devzone.nordicsemi.com/tutorials/b/bluetooth-low-energy/posts/ble-characteristics-a-beginners-tutorial0)
|
||||
- Reconnaissance (Active and Passive) with HCI Tools
|
||||
- [btproxy](https://github.com/conorpp/btproxy)
|
||||
- [hcitool & bluez](https://www.pcsuggest.com/linux-bluetooth-setup-hcitool-bluez)
|
||||
- [Testing With GATT Tool](https://www.jaredwolff.com/blog/get-started-with-bluetooth-low-energy/)
|
||||
- [Cracking encryption](https://github.com/mikeryan/crackle)
|
||||
|
||||
|
||||
#### Mobile security (Android & iOS)
|
||||
[Android](https://www.packtpub.com/hardware-and-creative/learning-pentesting-android-devices)
|
||||
[IOS Pentesting](https://web.securityinnovation.com/hubfs/iOS%20Hacking%20Guide.pdf?)
|
||||
- [Android](https://www.packtpub.com/hardware-and-creative/learning-pentesting-android-devices)
|
||||
- [IOS Pentesting](https://web.securityinnovation.com/hubfs/iOS%20Hacking%20Guide.pdf?)
|
||||
|
||||
#### ARM(https://azeria-labs.com/)
|
||||
#### [ARM](https://azeria-labs.com/)
|
||||
|
||||
|
||||
#### Firmware Pentest
|
||||
- [Firmware analysis and reversing](https://www.youtube.com/watch?v=G0NNBloGIvs)
|
||||
- [Firmware emulation with QEMU](https://www.youtube.com/watch?v=G0NNBloGIvs)
|
||||
- [Firmware analysis and reversing](https://www.youtube.com/watch?v=G0NNBloGIvs)
|
||||
- [Firmware emulation with QEMU](https://www.youtube.com/watch?v=G0NNBloGIvs)
|
||||
|
||||
### IoT hardware Overview
|
||||
- [Introduction to hardware]
|
||||
- [IoT Hardware Guide](https://www.postscapes.com/internet-of-things-hardware/)
|
||||
- [Introduction to hardware]
|
||||
- [IoT Hardware Guide](https://www.postscapes.com/internet-of-things-hardware/)
|
||||
|
||||
#### Hardware Tools
|
||||
- [Bus Pirate](https://www.sparkfun.com/products/12942)
|
||||
- [EEPROM readers](https://www.ebay.com/bhp/eeprom-reader)
|
||||
- [Jtagulator / Jtagenum](https://www.adafruit.com/product/1550)
|
||||
- [Logic Analyzer](https://www.saleae.com/)
|
||||
- [Bus Pirate](https://www.sparkfun.com/products/12942)
|
||||
- [EEPROM readers](https://www.ebay.com/bhp/eeprom-reader)
|
||||
- [Jtagulator / Jtagenum](https://www.adafruit.com/product/1550)
|
||||
- [Logic Analyzer](https://www.saleae.com/)
|
||||
|
||||
#### Attacking Hardware Interfaces
|
||||
- [Serial Terminal Basics](https://learn.sparkfun.com/tutorials/terminal-basics/all)
|
||||
- [Reverse Engineering Serial Ports](http://www.devttys0.com/2012/11/reverse-engineering-serial-ports/)
|
||||
- [Serial Terminal Basics](https://learn.sparkfun.com/tutorials/terminal-basics/all)
|
||||
- [Reverse Engineering Serial Ports](http://www.devttys0.com/2012/11/reverse-engineering-serial-ports/)
|
||||
|
||||
#### UART
|
||||
- [Identifying UART interface](https://www.mikroe.com/blog/uart-serial-communication)
|
||||
- [onewire-over-uart](https://github.com/dword1511/onewire-over-uart)
|
||||
- [Accessing sensor via UART](http://home.wlu.edu/~levys/courses/csci250s2017/SensorsSignalsSerialSockets.pdf)
|
||||
- [Identifying UART interface](https://www.mikroe.com/blog/uart-serial-communication)
|
||||
- [onewire-over-uart](https://github.com/dword1511/onewire-over-uart)
|
||||
- [Accessing sensor via UART](http://home.wlu.edu/~levys/courses/csci250s2017/SensorsSignalsSerialSockets.pdf)
|
||||
#### JTAG
|
||||
- [Identifying JTAG interface](https://blog.senr.io/blog/jtag-explained)
|
||||
- [NAND Glitching Attack](http://www.brettlischalk.com/posts/nand-glitching-wink-hub-fo
|
||||
- [Identifying JTAG interface](https://blog.senr.io/blog/jtag-explained)
|
||||
- [NAND Glitching Attack](http://www.brettlischalk.com/posts/nand-glitching-wink-hub-fo
|
||||
|
||||
Reference in New Issue
Block a user