Umay - IoT Malware Similarity Analysis Platform
http://www.kitploit.com/2021/12/umay-iot-malware-similarity-analysis.html
@IotPenetrationTesting
http://www.kitploit.com/2021/12/umay-iot-malware-similarity-analysis.html
@IotPenetrationTesting
KitPloit - PenTest & Hacking Tools
Umay - IoT Malware Similarity Analysis Platform
Honeypot experiment reveals what hackers want from IoT devices
https://www.bleepingcomputer.com/news/security/honeypot-experiment-reveals-what-hackers-want-from-iot-devices/
@IotPenetrationTesting
https://www.bleepingcomputer.com/news/security/honeypot-experiment-reveals-what-hackers-want-from-iot-devices/
@IotPenetrationTesting
BleepingComputer
Honeypot experiment reveals what hackers want from IoT devices
A three-year-long honeypot experiment featuring simulated low-interaction IoT devices of various types and locations gives a clear idea of why actors target specific devices.
Inside the Black Box | How We Fuzzed Microsoft Defender for IoT and Found Multiple Vulnerabilities
https://www.sentinelone.com/labs/inside-the-black-box-how-we-fuzzed-microsoft-defender-for-iot-and-found-multiple-vulnerabilities/
@IotPenetrationTesting
https://www.sentinelone.com/labs/inside-the-black-box-how-we-fuzzed-microsoft-defender-for-iot-and-found-multiple-vulnerabilities/
@IotPenetrationTesting
SentinelOne
Inside the Black Box | How We Fuzzed Microsoft Defender for IoT and Found Multiple Vulnerabilities
A must-read for fuzzing fans, this post gives a detailed look at the advanced techniques used in our recent discovery of multiple bugs in Defender for IoT.
How to Hack MQTT - The Standard for IoT Messaging
https://securitycafe.ro/2022/04/08/iot-pentesting-101-how-to-hack-mqtt-the-standard-for-iot-messaging
@IotPenetrationTesting
https://securitycafe.ro/2022/04/08/iot-pentesting-101-how-to-hack-mqtt-the-standard-for-iot-messaging
@IotPenetrationTesting
Security Café
IoT Pentesting 101: How to Hack MQTT – The Standard for IoT Messaging
Pentesting IoT MQTT protocol on emulated environment deployed using mosquitto. Dictionary attacks, DoS, or exploiting dummy ICS Environments are presented.
Unpatched DNS bug affects millions of routers and #IoT devices
https://www.bleepingcomputer.com/news/security/unpatched-dns-bug-affects-millions-of-routers-and-iot-devices/
@IotPenetrationTesting
https://www.bleepingcomputer.com/news/security/unpatched-dns-bug-affects-millions-of-routers-and-iot-devices/
@IotPenetrationTesting
BleepingComputer
Unpatched DNS bug affects millions of routers and IoT devices
A vulnerability in the domain name system (DNS) component of a popular C standard library that is present in a wide range of IoT products may put millions of devices at DNS poisoning attack risk.
Microsoft best practices for managing IoT security concerns
https://www.microsoft.com/security/blog/2022/04/25/microsoft-best-practices-for-managing-iot-security-concerns/
@IotPenetrationTesting
https://www.microsoft.com/security/blog/2022/04/25/microsoft-best-practices-for-managing-iot-security-concerns/
@IotPenetrationTesting
Microsoft Security Blog
Microsoft best practices for managing IoT security concerns | Microsoft Security Blog
The Internet of Things, or IoT, has expanded beyond the mere concept that it was when first introduced. IoT is now part of most individuals’ daily activities, from smart speakers and thermostats to smartwatches and vehicles. IoT devices and systems bring…
#Malware_analysis
IoT malware EnemyBot
https://cybersecurity.att.com/blogs/labs-research/rapidly-evolving-iot-malware-enemybot-now-targeting-content-management-system-servers
IoT malware EnemyBot
https://cybersecurity.att.com/blogs/labs-research/rapidly-evolving-iot-malware-enemybot-now-targeting-content-management-system-servers
LevelBlue
Rapidly evolving IoT malware EnemyBot now targeting Content…
Executive summary LevelBlue Labs™ has been tracking a new IoT botnet dubbed “EnemyBot”, which is believed to be distributed by threat actor Keksec. During our investigations, LevelBlue Labs has discovered that EnemyBot is expanding its capabilities, exploiting…
https://github.com/woj-ciech/Kamerka-GUI/
With this tool, you can reconnect in the field of IoT and industrial control systems.
For example, depending on the country, you can find industrial control devices, medical equipment, IoT.
Using geographical features such as Google Maps, find the exact location of the device (for example, hospital, etc.)
Yousri also has attack facilities, such as Brute Force and Exploit.
@IotPenetrationTesting
With this tool, you can reconnect in the field of IoT and industrial control systems.
For example, depending on the country, you can find industrial control devices, medical equipment, IoT.
Using geographical features such as Google Maps, find the exact location of the device (for example, hospital, etc.)
Yousri also has attack facilities, such as Brute Force and Exploit.
@IotPenetrationTesting
GitHub
GitHub - woj-ciech/Kamerka-GUI: Ultimate Internet of Things/Industrial Control Systems reconnaissance tool.
Ultimate Internet of Things/Industrial Control Systems reconnaissance tool. - woj-ciech/Kamerka-GUI
Dynamic analysis of firmware components in IoT devices
https://ics-cert.kaspersky.com/publications/reports/2022/07/06/dynamic-analysis-of-firmware-components-in-iot-devices
@IotPenetrationTesting
https://ics-cert.kaspersky.com/publications/reports/2022/07/06/dynamic-analysis-of-firmware-components-in-iot-devices
@IotPenetrationTesting
Kaspersky ICS CERT | Kaspersky Industrial Control Systems Cyber Emergency Response Team
Dynamic analysis of firmware components in IoT devices | Kaspersky ICS CERT
Firmware analysis is an essential part of security research and targeted search for vulnerabilities in IoT products. This article examines conventional methods of dynamic analysis and some less obvious methods.
Lumos: IoT device detection system
چگونه دوربین و میکروفون مخفی را تشخیص دهیم | وبلاگ رسمی کسپرسکی
https://www.kaspersky.com/blog/how-to-find-spy-cameras-and-other-iot-devices/44833/
@IotPenetrationTesting
چگونه دوربین و میکروفون مخفی را تشخیص دهیم | وبلاگ رسمی کسپرسکی
https://www.kaspersky.com/blog/how-to-find-spy-cameras-and-other-iot-devices/44833/
@IotPenetrationTesting
Kaspersky
How else to detect hidden cameras and microphones
A new method for detecting hidden cameras, microphones and other IoT spy devices that seems to actually work.
Introducing security for unmanaged devices in the Enterprise network with Microsoft Defender for IoT
https://www.microsoft.com/security/blog/2022/07/11/introducing-security-for-unmanaged-devices-in-the-enterprise-network-with-microsoft-defender-for-iot/
#IoT
@IotPenetrationTesting
https://www.microsoft.com/security/blog/2022/07/11/introducing-security-for-unmanaged-devices-in-the-enterprise-network-with-microsoft-defender-for-iot/
#IoT
@IotPenetrationTesting
Microsoft Security Blog
Introducing security for unmanaged devices in the Enterprise network with Microsoft Defender for IoT | Microsoft Security Blog
Microsoft Defender IoT is generally available to help organizations challenged with securing unmanaged Internet of Things devices connected to the network.
ZTNA – An Enterprise Game Changer For Securing Remote Access to #IoT & BYOD
https://gbhackers.com/ztna-an-enterprise-game-changer-for-securing-remote-access-to-iot-byod/
@IotPenetrationTesting
https://gbhackers.com/ztna-an-enterprise-game-changer-for-securing-remote-access-to-iot-byod/
@IotPenetrationTesting
GBHackers Security | #1 Globally Trusted Cyber Security News Platform
ZTNA - An Enterprise Game Changer For Securing Remote Access to IoT & BYOD - GBHackers Security | #1 Globally Trusted Cyber Security…
Internet networks have expanded far beyond the world of traditional desktop computers. Today, we rely on Google Nest to raise or lower the temperature in our house, on Alexa to play music just by shouting the name of the song or band, and on a range of other…
#IoT, #OT cybersecurity challenges: Investments and breaches
https://www.securitymagazine.com/articles/97979-iiot-ot-cybersecurity-challenges-investments-and-breaches
@IotPenetrationTesting
https://www.securitymagazine.com/articles/97979-iiot-ot-cybersecurity-challenges-investments-and-breaches
@IotPenetrationTesting
Security Magazine
IIoT, OT cybersecurity challenges: Investments and breaches
Barracuda research finds organizations are struggling to protect operational technology and getting breached as a result.
The EMUX Firmware Emulation Framework is a collection of noscripts, kernels and filesystems to be used with QEMU to emulate ARM and MIPS Linux #IoT devices. EMUX is aimed to facilitate IoT research by virtualising as much of the physical device as possible. It is the closest we can get to an actual IoT VM.
Devices successfully emulated with EMUX so far:
+ Damn Vulnerable ARM Router
+ Damn Vulnerable MIPS Router (Little Endian) [NEW!]
+ Damn Vulnerable MIPS Router (Big Endian) [NEW!]
+ Trivision NC227WF Wireless IP Camera
+ Tenda AC15 Wi-Fi Router (Github Docs)
+ Archer C9 Wi-Fi Router
https://github.com/therealsaumil/emux
@IotPenetrationTesting
Devices successfully emulated with EMUX so far:
+ Damn Vulnerable ARM Router
+ Damn Vulnerable MIPS Router (Little Endian) [NEW!]
+ Damn Vulnerable MIPS Router (Big Endian) [NEW!]
+ Trivision NC227WF Wireless IP Camera
+ Tenda AC15 Wi-Fi Router (Github Docs)
+ Archer C9 Wi-Fi Router
https://github.com/therealsaumil/emux
@IotPenetrationTesting
GitHub
GitHub - therealsaumil/emux: EMUX Firmware Emulation Framework (formerly ARMX)
EMUX Firmware Emulation Framework (formerly ARMX). Contribute to therealsaumil/emux development by creating an account on GitHub.
Gallia is an extendable pentesting framework with the focus on the automotive domain. The scope of the toolchain is conducting penetration tests from a single #ECU up to whole cars.
Currently, the main focus lies on the UDS interface. Taking advantage of this modular design, the logging and archiving functionality was developed separately.
Acting as a generic interface, the logging functionality implements reproducible tests and enables post-processing tasks. The rendered documentation is available via Github Pages.
https://github.com/Fraunhofer-AISEC/gallia
@IotPenetrationTesting
Currently, the main focus lies on the UDS interface. Taking advantage of this modular design, the logging and archiving functionality was developed separately.
Acting as a generic interface, the logging functionality implements reproducible tests and enables post-processing tasks. The rendered documentation is available via Github Pages.
https://github.com/Fraunhofer-AISEC/gallia
@IotPenetrationTesting
GitHub
GitHub - Fraunhofer-AISEC/gallia: Extendable Pentesting Framework
Extendable Pentesting Framework. Contribute to Fraunhofer-AISEC/gallia development by creating an account on GitHub.
H0neyP0t
Development of Botnet Detection Module for Traffic-Based IoT Devices Using Deep Learning
https://github.com/wja0/H0neyP0t
@IotPenetrationTesting
Development of Botnet Detection Module for Traffic-Based IoT Devices Using Deep Learning
https://github.com/wja0/H0neyP0t
@IotPenetrationTesting
GitHub
GitHub - wja0/IoT-Botnet-Attack-Detection-Module: Development of Botnet Detection Module for Traffic-Based IoT Devices Using Deep…
Development of Botnet Detection Module for Traffic-Based IoT Devices Using Deep Learning - wja0/IoT-Botnet-Attack-Detection-Module