IoT/ICS Security & Malware – Telegram
IoT/ICS Security & Malware
618 subscribers
101 photos
6 videos
40 files
261 links
Denoscription about the channel :

https://news.1rj.ru/str/IotPenetrationTesting/307
Download Telegram
​​ꓘamerka GUI

Ultimate Internet of Things/Industrial Control Systems reconnaissance tool.

Features:
▫️ More than 100 ICS devices
▫️ Gallery section shows every gathered screenshot in one place
▫️ Interactive Google maps
▫️ Google street view support
▫️ Possibility to implement own exploits or scanning techiques
▫️ Support for NMAP scan in xml format as an input
▫️ Find the route and change location of device
▫️ Statistics for each search
▫️ Search Flick photos nearby your device
▫️ Position for vessels is scraped from device directly, rather than IP based
▫️ Some devices return hints or location in the response. It's parsed and displayed as an indicator that helps to geolocate device.

https://github.com/woj-ciech/Kamerka-GUI
#IoT #ICS
@IotPenetrationTesting
DNS_Securing.pdf
1.4 MB
Securing name resolution in the #IoT: DNS over CoAP

@IotPenetrationTesting
درود دوستان کانال ما یعنی @pfk_Security اکانتش پاک شد متاسفتانه مجدد کانال دیگری زدیم و فعالیتمان را مجدد بعد از جوین شما کاربران قدیمی و کاربران جدید اغاز خواهیم کرد .
کانال جدید :
@PfkSecurity
​​CVE-2022-27255

Realtek eCos SDK SIP ALG buffer overflow.

This repository contains de materials for the talk "Exploring the hidden attack surface of OEM #IoT devices: pwning thousands of routers with a vulnerability in Realtek’s SDK for eCos OS.", which was presented at DEFCON30.

https://github.com/infobyte/cve-2022-27255

#cve
@IotPenetrationTesting
In the latest install of the Call of Duty series: Modern Warfare II (2022) players can conduct DDoS attacks. The DDoS attack will disrupt or disable enemies or enemy equipment.

tl;dr in the future helicopters, tanks, guns, and even human beings will be IoT devices.
IoT_Security_CheckList.pdf
401.3 KB
IoT Security Checklist

The checklist lists 39 essential security functions that enable IoT devices to be operated safely even in an environment where threats exist, along with background information on why they are necessary

IoT Security Checklist Diagram, Users Manual, Checklist in .xlsx:
https://www.jpcert.or.jp/english/pub/sr/IoT-SecurityCheckList.html
#IoT
@Iotpenetrationtesting
To some admins to post IoT & ICS Hacking posts on the channel to share with other friends and if possible to offer conferences.

Contact : @NetPwn
🔥🔥🔥Xiongmai IoT Exploitation(exploited in the wild)

There are a number of reasons Xiongmai devices are interesting targets:
💾 The first reason is there are a lot of them on the internet(around 200,000).
💾The second reason is these devices have been affected by a handful of high or critical vulnerabilities(CVE-2017-7577, CVE-2018-10088, CVE-2020-22253, CVE-2021-41506, CVE-2022-26259, CVE-2022-45045 & CVE-2022-45640)
💾And that’s interesting due to an almost complete lack of high quality exploits for these vulnerabilities.
#IOT
#PrivateShizo
@Iotpenetrationtesting