原文始发于GitHub:IoT安全相关资料汇总
amazing-iot-security
A list of lists involving IoT security in general ?? ??
Certifications/Courses
1. Blogs/Sites
- https://medium.com/nutsaboutsec (my blog in portuguese :3)
- https://cjhackerz.net
- https://www.bunniestudios.com/blog/
- https://hackaday.com/
- http://www.grandideastudio.com/
- https://azeria-labs.com/
- https://fredericb.info/
- https://www.semecayounexploit.com/
- https://owasp.org/www-project-embedded-application-security/
- https://github.com/scriptingxss/embeddedappsec
- https://www.iotpentest.com/
- https://payatu.com/blog
- http://jcjc-dev.com/
- http://www.devttys0.com/
- https://www.rtl-sdr.com/
- https://keenlab.tencent.com/en/
- https://courk.cc/
- https://iotsecuritywiki.com/
- https://iotmyway.wordpress.com/
- http://blog.k3170makan.com/
- https://blog.tclaverie.eu/
- http://www.sp3ctr3.me/hardware-security-resources/
- https://www.0x42424242.in/
- https://dantheiotman.com/
- https://blog.danman.eu/
- https://quentinkaiser.be/
- https://blog.grimm-co.com/
2. Lists
- https://github.com/V33RU/IoTSecurity101
- https://github.com/nebgnahz/awesome-iot-hacks
- https://github.com/fkie-cad/awesome-embedded-and-iot-security
3. Groups
4. Books
-
The Hardware Hacker: Adventures in Making and Breaking Hardware
-
The IoT Hacker’s Handbook: A Practical Guide to Hacking the Internet of Things
5. YouTube Channels
5.1 Playlists:
6. Helpful Tools/Ticks:
6.1 Shodan Dorks:
- http://pentestit.com/shodan-queries/?PageSpeed=noscript
- https://github.com/robocyber/Shodan-Dorks
- https://twitter.com/i/moments/924862201667702784 (Moshe Zioni)
6.2 Tools:
7. Other Topics:
7.1 Mobile Devices USB Vulnerabilities and links:
-
checkm8: an unpatchable bootrom exploit for hundreds of millions of iOS devices (2019)
-
Android: directory traversal over USB via injection in blkid output (2018)
-
OATmeal on the Universal Cereal Bus: Exploiting Android phones over USB (2018)
-
Google Nexus 6 f_usbnet Kernel Uninitialized Memory Leak Over USB (2016)
-
DualToy: New Windows Trojan Sideloads Risky Apps to Android and iOS Devices (2016)
-
USB connection vulnerabilities on Android smartphones: default and vendors’ customizations (2014)
- https://www.researchgate.net/profile/Manuel_Eduardo_Correia/publication/264003931_USB_Connection_Vulnerabilities_on_Android_Smartphones_Default_and_Vendors’_Customizations/links/544f6e8e0cf29473161c3a15/USB-Connection-Vulnerabilities-on-Android-Smartphones-Default-and-Vendors-Customizations.pdf
- https://repositorio-aberto.up.pt/bitstream/10216/76109/2/32399.pdf
-
Mactans Injecting Malware into iOS Devices via Malicious Chargers (2013)
-
Exploiting Smart-Phone USB Connectivity For Fun And Profit (2011)
-
DEF CON 17 – Rafael Dominiguez Vega – USB Attacks Fun with Plug and own
CPU Vulnerabilities
7.27.3 Visitor Managing Systems Vulnerabilities and links:
- Lobby Track Desktop (Jolly Technologies)
- CVE-2018-17482 Lobby Track Desktop visitor records information disclosure
- CVE-2018-17483 Lobby Track Desktop Driver’s License number information disclosure
- CVE-2018-17484 Lobby Track Desktop database information disclosure
- CVE-2018-17485 Lobby Track Desktop default account
- CVE-2018-17486 Lobby Track Desktop visitor records security bypass
- CVE-2018-17487 Lobby Track Desktop kiosk breakout privilege escalation
- CVE-2018-17488 Lobby Track Desktop kiosk breakout privilege escalation
- EasyLobby Solo (HID Global)
- eVisitorPass (Threshold Security)
- CVE-2018-17493 eVisitorPass Fullscreen button breakout privilege escalation
- CVE-2018-17494 eVisitorPass Start Menu breakout privilege escalation
- CVE-2018-17495 eVisitorPass Help Dialog privilege escalation
- CVE-2018-17496 eVisitorPass kiosk privilege escalation
- CVE-2018-17497 eVisitorPass admin credentials default account
- Envoy Passport (Envoy)
- The Receptionist (The Receptionist)
- Brucon 2009: Rage Against The Kiosk
- DEF CON 19 – Paul Craig – Internet Kiosk Terminals : The Redux
- Smart City Security – Touchscreen Kiosks Get Hacked
- Kiosk Hacking: 8 Tips to Harden Your Kiosk Security
7.4 PoS Systems/ATM Vulnerabilities and links:
-
WOOT ’13 – Cloning Credit Cards: A Combined Pre-play and Downgrade Attack on EMV Contactless – https://www.usenix.org/system/files/conference/woot13/woot13-roland.pdf
-
DEF CON 24 – Weston Hecker – Hacking Hotel Keys and Point of Sale Systems
-
Jackpotting ATM’s (Automated Teller Machines) – Its easier than you might think – Alexander Forbes
-
35C3 – Truly cardless: Jackpotting an ATM using auxiliary devices.
-
DEFCON 19: Steal Everything, Kill Everyone, Cause Total Financial Ruin!
-
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions
7.5 CTF Platforms and Challenges
- Microcorruption
- HTB Hardware Challenges
- IoT Goat
- Rhme
- DVAR
- CTF Time
- Hack@DAC / Hack@SEC
- Defcon CTF
- Hack-A-Sat
7.6 CTF Writeups
- Insomni’hack 2018 – S3curLock
- Riscure Embedded Hardware CTF
- Rhme 2017
- Rhme 2016
- Rhme 2015
- GoogleCTF 2019 – Flagrom
- Ph0wn 2018
- GoogleCTF 2017 – Slot Machine
- CONFidenceCTF 2020 – GPIO tap
- FlareOn 4