Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Locked Expliot


0x1

Recommended Posts

Internet Of Things Exploitation Framework

This is the hidden content, please

Expl-iot is an open source flexible and extendable framework for IoT Security Testing and exploitation. It will provide the building block for writing exploits and other IoT security assessment test cases with ease. Expliot will support most IoT communication protocols, firmware analysis, hardware interfacing functionality and test cases that can be used from within the framework to quickly map and exploit an IoT product or IoT Infrastructure.It will help the security community in writing quick IoT test cases and exploits.

Once we started implementing hardware and radio functionality, we realized that ruby does not have much support for hardware and radio analysis which led us to deprecate it and re-write it in python to support more functionality. We are currently working on the python3 version and will release it in a month. The new beta release is envisioned to have support for UART(serial), ZigBee, BLE, MQTT, CoAP (next version will have support for JTAG, I2C and SPI) and few miscellaneous test cases.

Note:
Expliot is developed in python3. It will not work on python2

Objective

  1. Easy to use
  2. Easy to extend
  3. Support for most IoT protocols
  4. Support for Radio IoT protocols
  5. Support for hardware protocols
  6. One-stop-shop for IoT and IoT infrastructure security testing.

Install

Make sure you have python3 installed
Install bluepy dependency => libglib2 $: sudo apt-get install libglib2.0-dev

$ Install pyspiflash/pyftdi dependency => libusb1 $: sudo apt-get install libusb-1.0

Author

  • Name: Aseem Jakhar
  • Twitter: @aseemjakhar
  • Linkedin: Aseem Jakhar

Download && Source :

This is the hidden content, please

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.