diff --git a/README.md b/README.md index 6f39ce4..2da1bc1 100644 --- a/README.md +++ b/README.md @@ -2,7 +2,7 @@ -##**Approach Methodology** +## **Approach Methodology** 1. Network 2. Web (Front & Backend and Web services) 3. Mobile App(Android & iOS) @@ -11,7 +11,7 @@ 6. Hardware Level Approach 7. Storage Areas -###***To seen Hacked devices*** +### ***To seen Hacked devices*** 1. https://blog.exploitee.rs/2018/10/ 2. https://www.exploitee.rs/ 3. https://forum.exploitee.rs/ @@ -27,7 +27,7 @@ ### ***Telegram group for IoT Security*** - https://t.me/iotsecurity1011 -###***Books*** +### ***Books*** - [Android Hacker's Handbook](https://www.amazon.in/Android-Hackers-Handbook-MISL-WILEY-Joshua/dp/812654922X) - [Hacking the Xbox](https://www.nostarch.com/xboxfree) - [Car hacker's handbook](http://opengarages.org/handbook) @@ -38,7 +38,7 @@ - [Linux Binary Analysis](https://www.packtpub.com/networking-and-servers/learning-linux-binary-analysis) - [Firmware](https://www.amazon.com/Firmware-Handbook-Embedded-Technology/dp/075067606X) -###***Blogs for iotpentest*** +### ***Blogs for iotpentest*** 1. http://iotpentest.com/ 2. https://blog.attify.com 3. https://payatu.com/blog/ @@ -58,14 +58,14 @@ 17. https://ctrlu.net/ 18. https://duo.com/decipher/ -###***Search Engines for IoT Devices*** +### ***Search Engines for IoT Devices*** 1. [Shodan](https://www.shodan.io/) 2. [FOFA](https://fofa.so/?locale=en) 3. [Censys](https://censys.io/) 4. [Zoomeye](https://www.zoomeye.org/about) 5. [ONYPHE](https://www.onyphe.io/) -###***CTF For IoT's And Embeddded*** +### ***CTF For IoT's And Embeddded*** 1. https://github.com/hackgnar/ble_ctf 2. https://www.microcorruption.com/ 3. https://github.com/Riscure/Rhme-2016 @@ -73,7 +73,7 @@ 5. https://blog.exploitlab.net/2018/01/dvar-damn-vulnerable-arm-router.html 6. https://github.com/scriptingxss/IoTGoat -###***YouTube Channels for IoT Pentesting*** +### ***YouTube Channels for IoT Pentesting*** 1. [Liveoverflow](https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w) 2. [Binary Adventure](https://www.youtube.com/channel/UCSLlgiYtOXZnYPba_W4bHqQ) 3. [EEVBlog](https://www.youtube.com/user/EEVblog) @@ -84,13 +84,13 @@ 8. [Ghidra Ninja](https://www.youtube.com/channel/UC3S8vxwRfqLBdIhgRlDRVzw) -###***IoT security vulnerabilites checking guides*** +### ***IoT security vulnerabilites checking guides*** - [Reflecting upon OWASP TOP-10 IoT Vulnerabilities](https://embedi.org/blog/reflecting-upon-owasp-top-10-iot-vulnerabilities/) - [OWASP IoT Top 10 2018 Mapping Project](https://scriptingxss.gitbook.io/owasp-iot-top-10-mapping-project/) -###***Exploitation Tools & OS*** +### ***Exploitation Tools & OS*** - [Expliot - IoT Exploitation framework - by Aseemjakhar](https://gitlab.com/expliot_framework/expliot) - [AttifyOS - IoT Pentest OS - by Aditya Gupta](https://github.com/adi0x90/attifyos) - [Ubutnu Best Host Linux for IoT's - Use LTS](https://www.ubuntu.com/) @@ -99,14 +99,14 @@ - [Routersploit (Exploitation Framework for Embedded Devices)](https://github.com/threat9/routersploit) - [IoTSecFuzz (comprehensive testing for IoT device)](https://gitlab.com/invuls/iot-projects/iotsecfuzz) -###***Reverse Enginnering Tools*** +### ***Reverse Enginnering Tools*** - [IDA Pro](https://www.youtube.com/watch?v=fgMl0Uqiey8) - [GDB](https://www.youtube.com/watch?v=fgMl0Uqiey8) - [Radare2](https://radare.gitbooks.io/radare2book/content/) - [Ghidra](https://ghidra-sre.org/) -##***Introduction*** +## ***Introduction*** - [Introduction to IoT](https://en.wikipedia.org/wiki/Internet_of_things) - [IoT Architecture](https://www.c-sharpcorner.com/UploadFile/f88748/internet-of-things-part-2/) @@ -114,9 +114,9 @@ - [IoT Protocols Overview](https://www.postscapes.com/internet-of-things-protocols/) -##***IoT Protocols Pentesting*** +## ***IoT Protocols Pentesting*** -###***MQTT*** +### ***MQTT*** - [Introduction](https://www.hivemq.com/blog/mqtt-essentials-part-1-introducing-mqtt) - [Hacking the IoT with MQTT](https://morphuslabs.com/hacking-the-iot-with-mqtt-8edaf0d07b9b) - [thoughts about using IoT MQTT for V2V and Connected Car from CES 2014](https://mobilebit.wordpress.com/tag/mqtt/) @@ -125,20 +125,20 @@ - [A Guide to MQTT by Hacking a Doorbell to send Push Notifications](https://youtu.be/J_BAXVSVPVI) -###***CoAP*** +### ***CoAP*** - [Introduction](http://coap.technology/) - [CoAP client Tools](http://coap.technology/tools.html) - [CoAP Pentest Tools](https://bitbucket.org/aseemjakhar/expliot_framework) - [Nmap](https://nmap.org/nsedoc/lib/coap.html) -####***Automobile*** +### ***Automobile*** CanBus - [Introduction and protocol Overview](https://www.youtube.com/watch?v=FqLDpHsxvf8) - [PENTESTING VEHICLES WITH CANTOOLZ](https://www.blackhat.com/docs/eu-16/materials/eu-16-Sintsov-Pen-Testing-Vehicles-With-Cantoolz.pdf) - [Building a Car Hacking Development Workbench: Part1](https://blog.rapid7.com/2017/07/11/building-a-car-hacking-development-workbench-part-1/) - [CANToolz - Black-box CAN network analysis framework](https://github.com/CANToolz/CANToolz) -###***Radio IoT Protocols Overview*** +### ***Radio IoT Protocols Overview*** - [Understanding Radio](https://www.taitradioacademy.com/lessons/introduction-to-radio-communications-principals/) - [Signal Processing]() - [Software Defined Radio](https://www.allaboutcircuits.com/technical-articles/introduction-to-software-defined-radio/) @@ -148,11 +148,11 @@ - [Recording specific radio signal](https://www.rtl-sdr.com/freqwatch-rtl-sdr-frequency-scanner-recorder/) - [Replay Attacks](https://www.rtl-sdr.com/tutorial-replay-attacks-with-an-rtl-sdr-raspberry-pi-and-rpitx/) -###***Base transceiver station (BTS)*** +### ***Base transceiver station (BTS)*** - [what is base tranceiver station](https://en.wikipedia.org/wiki/Base_transceiver_station) - [How to Build Your Own Rogue GSM BTS](https://www.evilsocket.net/2016/03/31/how-to-build-your-own-rogue-gsm-bts-for-fun-and-profit/) -###***GSM & SS7 Pentesting*** +### ***GSM & SS7 Pentesting*** - [Introduction to GSM Security](http://www.pentestingexperts.com/introduction-to-gsm-security/) - [GSM Security 2 ](https://www.ehacking.net/2011/02/gsm-security-2.html) - [vulnerabilities in GSM security with USRP B200](https://ieeexplore.ieee.org/document/7581461/) @@ -165,13 +165,13 @@ - [Introduction to SS7 Signaling](https://www.patton.com/whitepapers/Intro_to_SS7_Tutorial.pdf) - [Breaking LTE on Layer Two](https://alter-attack.net/) -###***Zigbee & Zwave*** +### ***Zigbee & Zwave*** - [Introduction and protocol Overview](http://www.informit.com/articles/article.aspx?p=1409785) - [Hacking Zigbee Devices with Attify Zigbee Framework](https://blog.attify.com/hack-iot-devices-zigbee-sniffing-exploitation/) - [Hands-on with RZUSBstick](https://uk.rs-online.com/web/p/radio-frequency-development-kits/6962415/) - [ZigBee & Z-Wave Security Brief](http://www.riverloopsecurity.com/blog/2018/05/zigbee-zwave-part1/) -###***BLE*** +### ***BLE*** - [Traffic Engineering in a Bluetooth Piconet](http://www.diva-portal.org/smash/get/diva2:833159/FULLTEXT01.pdf) - [BLE Characteristics](https://devzone.nordicsemi.com/tutorials/b/bluetooth-low-energy/posts/ble-characteristics-a-beginners-tutorial0) Reconnaissance (Active and Passive) with HCI Tools @@ -181,36 +181,36 @@ - [Cracking encryption](https://github.com/mikeryan/crackle) - [bettercap](https://github.com/bettercap/bettercap) -###***BLE Sniffing/MiTM*** +### ***BLE Sniffing/MiTM*** - [BtleJuice Bluetooth Smart Man-in-the-Middle framework](https://github.com/DigitalSecurity/btlejuice) - [gattacker](https://github.com/securing/gattacker) - [BTLEjack Bluetooth Low Energy Swiss army knife](https://github.com/virtualabs/btlejack) -###***Mobile security (Android & iOS)*** +### ***Mobile security (Android & iOS)*** - [Android](https://www.packtpub.com/hardware-and-creative/learning-pentesting-android-devices) - [Android Pentest Video Course](https://www.youtube.com/watch?v=zHknRia3I6s&list=PLWPirh4EWFpESLreb04c4eZoCvJQJrC6H) - [IOS Pentesting](https://web.securityinnovation.com/hubfs/iOS%20Hacking%20Guide.pdf?) -###***ARM*** +### ***ARM*** - [Azeria Labs](https://azeria-labs.com/) - [ARM EXPLOITATION FOR IoT](https://www.exploit-db.com/docs/english/43906-arm-exploitation-for-iot.pdf) - [Static Binary analysis ARMV7](https://github.com/CJHackerz/easy_iotsec-arm) - [Damn Vulnerable ARM Router (DVAR)](https://blog.exploitlab.net/2018/01/dvar-damn-vulnerable-arm-router.html) - [EXPLOIT.EDUCATION](https://exploit.education/) -###***Firmware Pentest*** +### ***Firmware Pentest*** - [Firmware analysis and reversing](https://www.owasp.org/index.php/IoT_Firmware_Analysis) - [Firmware emulation with QEMU](https://www.youtube.com/watch?v=G0NNBloGIvs) - [Dumping Firmware using Buspirate](http://iotpentest.com/tag/pulling-firmware/) - [Reversing ESP8266 Firmware](https://boredpentester.com/reversing-esp8266-firmware-part-1/) -###***Firmware to pentest*** +### ***Firmware to pentest*** - [Download From here](https://firmware.center/) -###***IoT hardware Overview*** +### ***IoT hardware Overview*** - [IoT Hardware Guide](https://www.postscapes.com/internet-of-things-hardware/) -###***Hardware Gadgets to pentest*** +### ***Hardware Gadgets to pentest*** - [Bus Pirate](https://www.sparkfun.com/products/12942) - [EEPROM readers](https://www.ebay.com/bhp/eeprom-reader) - [Jtagulator / Jtagenum](https://www.adafruit.com/product/1550) @@ -223,21 +223,21 @@ - [Attify Badge - UART, JTAG, SPI, I2C (w/ headers)](https://www.attify-store.com/products/attify-badge-assess-security-of-iot-devices) - [Ubertooth](https://github.com/greatscottgadgets/ubertooth/wiki/Ubertooth-One) -###***Attacking Hardware Interfaces*** +### ***Attacking Hardware Interfaces*** - [Serial Terminal Basics](https://learn.sparkfun.com/tutorials/terminal-basics/all) - [Reverse Engineering Serial Ports](http://www.devttys0.com/2012/11/reverse-engineering-serial-ports/) - [REVERSE ENGINEERING ARCHITECTURE AND PINOUT OF CUSTOM ASICS](https://sec-consult.com/en/blog/2019/02/reverse-engineering-architecture-pinout-plc/) -###***UART*** +### ***UART*** - [Identifying UART interface](https://www.mikroe.com/blog/uart-serial-communication) - [onewire-over-uart](https://github.com/dword1511/onewire-over-uart) - [Accessing sensor via UART](http://home.wlu.edu/~levys/courses/csci250s2017/SensorsSignalsSerialSockets.pdf) - [Using UART to connect to a chinese IP cam](https://www.davidsopas.com/using-uart-to-connect-to-a-chinese-ip-cam/) - [A journey into IoT – Hardware hacking: UART](https://techblog.mediaservice.net/2019/03/a-journey-into-iot-hardware-hacking-uart/) -###***JTAG*** +### ***JTAG*** - [Identifying JTAG interface](https://blog.senr.io/blog/jtag-explained) - [NAND Glitching Attack](http://www.brettlischalk.com/posts/nand-glitching-wink-hub-for-root) -###***SideChannel Attacks*** +### ***SideChannel Attacks*** - [All Attacks](https://yifan.lu/)