Skip to content

Latest commit

 

History

History
50 lines (46 loc) · 849 Bytes

File metadata and controls

50 lines (46 loc) · 849 Bytes

IOT Pentest Checklist

IOt has a complex architecture. Below is the checklist when examining an IOT device

Recon

Exploitation

Post-Expolitation

Reporting

  • Software
    • Common vulnerabilities
      • XXS
      • SQLi
      • NoSQLi
      • File Inclusion
      • SSRF
      • XML
      • SSTI
      • LFI/RFI
      • Path Traversal
    • Misc
      • Harcoded passwords
      • Exposed API keys
      • Default passwords
  • API Vulnerabilities
    • BOLA
    • BOPLA
    • Misc
      • Zombie APIs
      • Shadow APIs
  • Mobile
    • Android
      • Hardcoded credentials
    • IOS
  • Cloud
  • RFID
  • Firmware
    • Look for the following
      • Default passwords
      • Common services
      • Bin files
      • URLs & IP Address
      • Configuration files
  • Hardware
    • Look for the following interfaces
      • SPI
      • I2C
      • UART
    • Common Hardware Vulnerabilities