|
18 | 18 | "key": "open_source_intelligence", |
19 | 19 | "title": "Open Source Intelligence", |
20 | 20 | "description": "Gathering information using search engines to find publicly available information about the device", |
21 | | - "tools": "Google Dorking components/device, FCC Database (fccid.io or fcc.io), Patents (patents.google.com, worldwide.espacenet.com/patent, appft.uspto.gov), Chinese OSINT (baidu.com, qichacha.com, right.com.cn, codechina.csdn.net, pudn.com, search.gitee.com), Finding datasheets for components", |
| 21 | + "tools": "Google Dorking components/device, FCC Database (fccid.io or fcc.io), Patents (patents.google.com, worldwide.espacenet.com/patent, appft.uspto.gov), Chinese OSINT (baidu.com, qichacha.com, right.com.cn, codechina.csdn.net, pudn.com, search.gitee.com), Finding datasheets for components", |
22 | 22 | "vrt_category": "sensitive_data_exposure" |
23 | 23 | }, |
24 | 24 | { |
|
35 | 35 | "type": "checklist", |
36 | 36 | "items": [ |
37 | 37 | { |
38 | | - "key": "bluetooth_ble", |
39 | | - "title": "Bluetooth and BLE", |
40 | | - "description": "Try to sniff the communication, check if it's encrypted, can it be decrypted, are replay attacks possible, check if sensitive information being transmitted in plaintext", |
| 38 | + "key": "bluetooth_ble", |
| 39 | + "title": "Bluetooth and BLE", |
| 40 | + "description": "Try to sniff the communication, check if it's encrypted, can it be decrypted, are replay attacks possible, check if sensitive information being transmitted in plaintext", |
41 | 41 | "tools": "Flipper, Ubertooth, Nordic nRF, Wireshark (might need to install an additional plugin and/or connect external hardware), btmon (linux), Bluetooth Virtual Sniffer (Windows)" |
42 | 42 | }, |
43 | 43 | { |
|
105 | 105 | "tools":"binwalk, QEMU, Ghidra, grep, strings, hexdump, readelf" |
106 | 106 | }, |
107 | 107 | { |
108 | | - "key":"testing_device", |
| 108 | + "key":"testing_device", |
109 | 109 | "title":"Testing the Device", |
110 | 110 | "description":"Using all of the information gathered start testing the device for security vulnerabilities.", |
111 | 111 | "type":"checklist", |
112 | 112 | "items":[ |
113 | 113 | { |
114 | | - "key":"replay_attacks", |
115 | | - "title":"Replay Attacks", |
116 | | - "description":"Using the sniffed traffic can you replay the messages sent to the device, will the device accept modified requests, can you make changes to the configuration. Device is using unencrypted communication.", |
117 | | - "tools":"Wireshark, hackRF, python" |
| 114 | + "key":"replay_attacks", |
| 115 | + "title":"Replay Attacks", |
| 116 | + "description":"Using the sniffed traffic, determine if replay attacks are possible. Check if the device accepts modified requests and if you can make changes to the configuration. Verify if the device uses unencrypted communication.", |
| 117 | + "tools":"Wireshark, hackRF, python" |
118 | 118 | }, |
119 | 119 | { |
120 | 120 | "key":"shared_resources", |
|
0 commit comments