IoT/ICS Security & Malware
630 subscribers
101 photos
6 videos
40 files
261 links
Description about the channel :

https://t.iss.one/IotPenetrationTesting/307
Download Telegram
DNS_Securing.pdf
1.4 MB
Securing name resolution in the #IoT: DNS over CoAP

@IotPenetrationTesting
درود دوستان کانال ما یعنی @pfk_Security اکانتش پاک شد متاسفتانه مجدد کانال دیگری زدیم و فعالیتمان را مجدد بعد از جوین شما کاربران قدیمی و کاربران جدید اغاز خواهیم کرد .
کانال جدید :
@PfkSecurity
​​CVE-2022-27255

Realtek eCos SDK SIP ALG buffer overflow.

This repository contains de materials for the talk "Exploring the hidden attack surface of OEM #IoT devices: pwning thousands of routers with a vulnerability in Realtek’s SDK for eCos OS.", which was presented at DEFCON30.

https://github.com/infobyte/cve-2022-27255

#cve
@IotPenetrationTesting
In the latest install of the Call of Duty series: Modern Warfare II (2022) players can conduct DDoS attacks. The DDoS attack will disrupt or disable enemies or enemy equipment.

tl;dr in the future helicopters, tanks, guns, and even human beings will be IoT devices.
IoT_Security_CheckList.pdf
401.3 KB
IoT Security Checklist

The checklist lists 39 essential security functions that enable IoT devices to be operated safely even in an environment where threats exist, along with background information on why they are necessary

IoT Security Checklist Diagram, Users Manual, Checklist in .xlsx:
https://www.jpcert.or.jp/english/pub/sr/IoT-SecurityCheckList.html
#IoT
@Iotpenetrationtesting
To some admins to post IoT & ICS Hacking posts on the channel to share with other friends and if possible to offer conferences.

Contact : @NetPwn
🔥🔥🔥Xiongmai IoT Exploitation(exploited in the wild)

There are a number of reasons Xiongmai devices are interesting targets:
💾 The first reason is there are a lot of them on the internet(around 200,000).
💾The second reason is these devices have been affected by a handful of high or critical vulnerabilities(CVE-2017-7577, CVE-2018-10088, CVE-2020-22253, CVE-2021-41506, CVE-2022-26259, CVE-2022-45045 & CVE-2022-45640)
💾And that’s interesting due to an almost complete lack of high quality exploits for these vulnerabilities.
#IOT
#PrivateShizo
@Iotpenetrationtesting
ShellCore.pdf
729.6 KB
"ShellCore: Automating Malicious IoT Software Detection by Using Shell Commands Representation", 2021.
#IoT_Security
@Iotpenetrationtesting
Gafgyt.pdf
4.3 MB
A Detailed Analysis of the Gafgyt Malware Targeting IoT Devices , 2022.

#Malware_analysis
#IoT_Security
@Iotpenetrationtesting
A tool which utilizes Shodan to detect vulnerable IoT devices.

BAMF is an open-source tool designed to leverage Shodan (a search engine for the Internet of Things) to discover routers vulnerable to CVE-2013-6026, commonly known as Joel's Backdoor, a severe vulnerability allowing unauthenticated access to the administration panel of many routers made by D-Link, one of the world's largest manufacturers of routers for home and business.

https://github.com/malwaredllc/bamf
#IoT
@Iotpenetrationtesting
درود
بدلیل مشغله کاری از تمامی دوستان فعال در حوزه های سایبری دعوت میشود به آیدی زیر پیام داده و در صورت تایید به عنوان مدیر و ویراستار جدید کانال انتخاب شوند
@Offensive01Bot