Skip to content

Security test bed for IOT device information leak and vulnerability scanning

License

Notifications You must be signed in to change notification settings

fubar2/SecurIOT

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

21 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

SecurIOT

Security test bed for IOT device information leak and vulnerability scanning

Idea is to enable script kiddies to describe and test IOT devices for vulnerabilities and to figure out what data they are leaking if any.

pcap contains code to parse a pcap file and make wordclouds of destinations for each source IP together with host:port specific destination port wordclouds as part of the fingerprinting process for a new IOT device.

For example, to make a decent sized file to analyse,

sudo tcpdump host [IOT IP] -i eth0 -c 10000 -w IOTNAME.pcap

will capture all traffic to and from any device IP address and produce wordclouds showing how much goes where.

Destinations:

example local machine destination wordcloud

Ports:

example remote machine destination port wordcloud

pmap contains a simple but reasonably fast threaded port scanner. It works something like this:

Enter a remote host to scan: 127.0.0.1
------------------------------------------------------------
Please wait, scanning remote host 127.0.0.1
------------------------------------------------------------
port 22 open
port 631 open
port 5001 open
port 32772 open
port 43208 open
port 51413 open
Scanning Completed in:  0:00:07.013983 secs

Because we can.

About

Security test bed for IOT device information leak and vulnerability scanning

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages