IoT Pentesting Approach Part-1
Hello everyone ,
Many Of you having a question how to start pentesting the IoT’s ,
With My experience I’m writing an approach Pentesting IoT’s
Pentesting Surfaces:
- Network
- Application Web, iOS, Android
- wireless communication
- Firmware
- Hardware
Network: An IoT environment runs on and is updated over a network, such as the Internet, MQTT, 802.11.15.4, etc others.
Applications: IoT applications manage device- Web App, Mobile App,, and they can be web apps, mobile apps, or APIs (SOAP, REST – Web services).
Wireless communication: BLE, 4G, LTE, Zigbee, LoRA, WiFi
Firmware: This is the device’s software and operating system.
Hardware: This is the IoT device hardware (Chip, such as a chip set, Storage, JTAG, UART, Spi And I2C ports, Sensors, Camera etc.
Testing Approach:
Network:
- Open Ports
- Checking the Versions off running services
- insecure communications
Applications:
- front-end web
- back-end web
- iOS app
- Android App
- Web services
Wireless Communication:
- PenTesting BLE (Bluetooth Low Energy)
- PenTesting Zigbee
- PenTesting Zwave
- PenTesting WiFi (Wireless Fidelity)
- PenTesting Lo-Ra
- PenTesting 4G
Firmware:
- checking hard coded data
- pull out file system and analyzing
- sensitive data identification
- checking encryption
- backdoor
- API tokens & End Points
- reverse engineering
Hardware:
- Identifying the pins like JTAG, Spi, UART, I2C
- Pulling firmware from the hardware
- shell access with open pins
- dechipping attack
- USB Attacking
*****
When solving problems dig @ roots, instead of just hacking at the leaves.
made with ☕ and 🛠️