Skip to content

Commit e30c68a

Browse files
adarshaks91Copilot
andauthored
Update methodologies/hardware_testing.json
Co-authored-by: Copilot <[email protected]>
1 parent df58811 commit e30c68a

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

methodologies/hardware_testing.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@
4343
{
4444
"key": "zigbee_lora",
4545
"title": "ZigBee and LoRa",
46-
"description":"For ZigBee and LoRa devices, try to sniff the communication, capture the encryption key exchange (during active recon see if it's hardcoded on the device), check if the communication can be decrypted, and determine if replay attacks are possible. For LoRa, also check for LoRaWAN-specific vulnerabilities, such as weak join procedures, unencrypted payloads, and improper key management.",
46+
"description": "For ZigBee and LoRa devices, try to sniff the communication, capture the encryption key exchange (during active recon see if it's hardcoded on the device), check if the communication can be decrypted, and determine if replay attacks are possible. For LoRa, also check for LoRaWAN-specific vulnerabilities, such as weak join procedures, unencrypted payloads, and improper key management.",
4747
"tools": "Nordic nRF, Wireshark (might need to install an additional plugin and/or connect external hardware), ZT-CHK, TI SmartRF Protocol Packet Sniffer (SPPS) software, Semtech LoRaWAN sniffer, TTN Packet Forwarder, SDR tools supporting LoRa (HackRF, LimeSDR, BladeRF), Universal Radio Hacker (URH)"
4848
},
4949
{

0 commit comments

Comments
 (0)