O'Reilly logo

IoT Penetration Testing Cookbook by Aditya Gupta, Aaron Guzman

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

How to do it...

For this exercise, we will require and use the following tools and utilities:

  • Damn Vulnerable Router Firmware (DVRF) - downloadable from the GitHub URL
  • GDB-Multiarch
  • GDB Enhanced Features (GEF)
  • QEMU
  • chroot
  • IDA Pro/Radare2 (optional)

Let's go through each of them one by one and see how to set them up. Let's go ahead and download the DVRF firmware from the following URL: https://github.com/praetorian-inc/DVRF/tree/master/Firmware.

DVRF is a firmware written by b1ack0wl with the firmware meant for the MIPS-based platforms. Even though the firmware is intended for Linksys E1550, it could be run in an emulated environment using QEMU which also includes performing of exploitation:

  1. Now that we have the firmware with us, let's ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required