IoT/ICS Security & Malware – Telegram
IoT/ICS Security & Malware
619 subscribers
101 photos
6 videos
40 files
261 links
Denoscription about the channel :

https://news.1rj.ru/str/IotPenetrationTesting/307
Download Telegram
The EMUX Firmware Emulation Framework is a collection of noscripts, kernels and filesystems to be used with QEMU to emulate ARM and MIPS Linux #IoT devices. EMUX is aimed to facilitate IoT research by virtualising as much of the physical device as possible. It is the closest we can get to an actual IoT VM.

Devices successfully emulated with EMUX so far:
+ Damn Vulnerable ARM Router
+ Damn Vulnerable MIPS Router (Little Endian) [NEW!]
+ Damn Vulnerable MIPS Router (Big Endian) [NEW!]
+ Trivision NC227WF Wireless IP Camera
+ Tenda AC15 Wi-Fi Router (Github Docs)
+ Archer C9 Wi-Fi Router

https://github.com/therealsaumil/emux

@IotPenetrationTesting
Channel name was changed to «IoT/ICS Security & Malware»
Gallia is an extendable pentesting framework with the focus on the automotive domain. The scope of the toolchain is conducting penetration tests from a single #ECU up to whole cars.

Currently, the main focus lies on the UDS interface. Taking advantage of this modular design, the logging and archiving functionality was developed separately.

Acting as a generic interface, the logging functionality implements reproducible tests and enables post-processing tasks. The rendered documentation is available via Github Pages.

https://github.com/Fraunhofer-AISEC/gallia

@IotPenetrationTesting
​​ꓘamerka GUI

Ultimate Internet of Things/Industrial Control Systems reconnaissance tool.

Features:
▫️ More than 100 ICS devices
▫️ Gallery section shows every gathered screenshot in one place
▫️ Interactive Google maps
▫️ Google street view support
▫️ Possibility to implement own exploits or scanning techiques
▫️ Support for NMAP scan in xml format as an input
▫️ Find the route and change location of device
▫️ Statistics for each search
▫️ Search Flick photos nearby your device
▫️ Position for vessels is scraped from device directly, rather than IP based
▫️ Some devices return hints or location in the response. It's parsed and displayed as an indicator that helps to geolocate device.

https://github.com/woj-ciech/Kamerka-GUI
#IoT #ICS
@IotPenetrationTesting
DNS_Securing.pdf
1.4 MB
Securing name resolution in the #IoT: DNS over CoAP

@IotPenetrationTesting
درود دوستان کانال ما یعنی @pfk_Security اکانتش پاک شد متاسفتانه مجدد کانال دیگری زدیم و فعالیتمان را مجدد بعد از جوین شما کاربران قدیمی و کاربران جدید اغاز خواهیم کرد .
کانال جدید :
@PfkSecurity
​​CVE-2022-27255

Realtek eCos SDK SIP ALG buffer overflow.

This repository contains de materials for the talk "Exploring the hidden attack surface of OEM #IoT devices: pwning thousands of routers with a vulnerability in Realtek’s SDK for eCos OS.", which was presented at DEFCON30.

https://github.com/infobyte/cve-2022-27255

#cve
@IotPenetrationTesting