Embedded and IoT Security
Contents
Software Tools
Analysis Frameworks
Analyze security of firmware based on customized rules. Intended as additional step in DevSecOps, similar to CI.
A comprehensive reverse engineering and manipulation framework for gate-level netlists.
Swiss Army Knife for Pentesting of IoT Devices.
Framework for Testing & Auditing ZigBee and IEEE 802.15.4 Networks.
Printer Exploitation Toolkit.
Framework dedicated to exploit embedded devices.
Analysis Tools
Searches a binary for "interesting" stuff, as well as extracts arbitrary files.
Finds vulnerable patterns in binary executables - ELF support for x86, ARM, and MIPS, experimental bare-metal support.
Analyze Linux-based firmware of embedded devices.
Tries to emulate and pentest a firmware.
Searches extracted firmware images for interesting files and information.
Discovering vulnerabilities in firmware through concolic analysis and function clustering.
Software Reverse Engineering framework, also handles popular formats and arbitrary binaries, has an extensive command line toolset.
Searches extracted firmware images for interesting files and information.
Extraction Tools
Misc Tools
Set of tools for security testing of Internet of Things devices using specific network IoT protocols.
Low-level NAND Flash dump and parsing utility.
Tool for detecting, reading, writing, verifying and erasing flash chips.
Decrypt Samsung SSD firmware updates.
Hardware Tools
Books
Free Training
CSAW 2019 Embedded Security Challenge (ESC).
IoTGoat is a deliberately insecure firmware based on OpenWrt.
First riscure Hack me hardware CTF challenge.
Riscure Hack me 2 is a low level hardware CTF challenge.
Riscure Hack Me 3 embedded hardware CTF 2017-2018.