mirror of
https://github.com/V33RU/awesome-connected-things-sec.git
synced 2026-04-10 12:33:45 +00:00
Update README.md
This commit is contained in:
117
README.md
117
README.md
@@ -1,3 +1,120 @@
|
||||
|
||||

|
||||
|
||||
[](https://github.com/V33RU/IoTSecurity101)
|
||||
**A Collection for IoT Security Resources**
|
||||
You are welcome to fork and [contribute](https://github.com/V33RU/IoTSecurity101/blob/master/contributors.md#contributors)
|
||||
|
||||
### Other Interesting Areas:
|
||||
- [ICS-Security](https://github.com/V33RU/IoTSecurity101/blob/master/ICS/Industrial%20Control%20Systems.md)
|
||||
- [Automotive-Security](https://github.com/V33RU/IoTSecurity101/blob/master/Automotive/Automotive-security.md)
|
||||
|
||||
---
|
||||
|
||||
## 🛠️ **Approach Methodology**
|
||||
|
||||
1. **Network**
|
||||
Security best practices for IoT networks, including tools and techniques.
|
||||
|
||||
2. **Web (Front & Backend and Web services)**
|
||||
Focus on IoT-specific web applications and APIs.
|
||||
|
||||
3. **Mobile App (Android & iOS)**
|
||||
Dedicated to mobile IoT app security (vulnerabilities, hardening, etc.).
|
||||
|
||||
4. **Wireless Connectivity**
|
||||
Analyzing Wi-Fi, Zigbee, Bluetooth, and more.
|
||||
|
||||
5. **Firmware Pentesting**
|
||||
Static/Dynamic analysis, operating systems of IoT devices, and emulation.
|
||||
|
||||
6. **Hardware Hacking**
|
||||
Focus on fault injection, side-channel attacks (SCA), and analysis tools.
|
||||
|
||||
7. **Storage Medium**
|
||||
Explore the security of embedded storage, such as eMMC and SD cards.
|
||||
|
||||
8. **I/O Ports**
|
||||
UART, SPI, JTAG, TPM, and other critical interfaces for hardware pentesting.
|
||||
|
||||
---
|
||||
|
||||
## 📑 **Contents Overview**
|
||||
|
||||
### 🛡️ **IoT Security Information**
|
||||
|
||||
- [Community and Discussion Platforms](#community-and-discussion-platforms)
|
||||
- [IoT and Hardware Security Trainings](#iot-and-hardware-security-trainings)
|
||||
- [Technical Research and Hacking](#technical-research-and-hacking)
|
||||
- [Proof of Concepts: Known Device Vulnerabilities](#proof-of-concepts-known-device-vulnerabilities)
|
||||
- [Books for IoT Penetration Testing](#books-for-iot-penetration-testing)
|
||||
- [Awesome Cheatsheets](#awesome-cheatsheets)
|
||||
- [Search Engines for Exposed IoT Devices](#search-engines-for-exposed-iot-devices)
|
||||
- [CTF: Vulnerable IoT Applications](#vulnerable-iot-and-hardware-applications)
|
||||
- [YouTube Channels for IoT Pentesting](#youtube-channels-for-iot-pentesting)
|
||||
- [Exploitation Tools](#exploitation-tools)
|
||||
- [IoT Pentesting OSes](#iot-pentesting-oses)
|
||||
- [IoT Vulnerabilities Guides](#iot-vulnerabilities-checking-guides)
|
||||
- [IoT Labs](#iot-labs)
|
||||
- [FlipperZero Hacks](#flipperzero)
|
||||
- [Villages](#villages)
|
||||
|
||||
---
|
||||
|
||||
### **📡 Wireless Protocols**
|
||||
- **Radio Hacking Starting Guide**
|
||||
- Start learning about Software Defined Radio (SDR) and its applications in IoT.
|
||||
|
||||
- **Cellular Hacking GSM BTS**
|
||||
- Explore GSM attacks using rogue base stations.
|
||||
|
||||
- **Zigbee**
|
||||
- Protocol overview and security analysis tools for Zigbee devices.
|
||||
|
||||
- **Bluetooth**
|
||||
- Learn about Bluetooth hacking using software and hardware tools.
|
||||
|
||||
---
|
||||
|
||||
### **💽 Firmware**
|
||||
- **Reverse Engineering Tools**
|
||||
- Comprehensive resources on tools like IDA Pro, Radare2, and Ghidra for analyzing firmware.
|
||||
|
||||
- **Pentesting Firmwares**
|
||||
- Techniques for emulating and pentesting firmware using QEMU, Firmadyne, and other tools.
|
||||
|
||||
---
|
||||
|
||||
### **🛠️ Hardware Hacking**
|
||||
- **IoT Hardware Overview**
|
||||
- A guide to the hardware used in IoT devices and tools for pentesting hardware.
|
||||
|
||||
- **Attacking Hardware Interfaces**
|
||||
- Methods for analyzing SPI, UART, JTAG, and TPM interfaces.
|
||||
|
||||
- **Side Channel Attacks & Glitching**
|
||||
- Introduction to side-channel attacks and fault injection techniques.
|
||||
|
||||
---
|
||||
|
||||
### 📋 **Awesome CheatSheets**
|
||||
- **Hardware Hacking Cheat Sheet**
|
||||
- A quick reference for hardware pentesting tools and techniques.
|
||||
|
||||
- **Nmap**
|
||||
- Tutorial and cheat sheet for network scanning using Nmap.
|
||||
|
||||
---
|
||||
|
||||
### **🚩 CTF: Vulnerable IoT and Hardware Applications**
|
||||
- **Vulnerable IoT Applications**
|
||||
Explore CTF platforms like [IoTGoat](https://github.com/scriptingxss/IoTGoat) and vulnerable firmware.
|
||||
|
||||
---
|
||||
|
||||
This enhanced layout highlights the important topics and ensures a smooth navigation experience for users exploring IoT security resources.
|
||||
NEW
|
||||
-----------
|
||||

|
||||
|
||||

|
||||
|
||||
Reference in New Issue
Block a user