Pentesting IoT devices (Part 1: Static Analysis)
Common Information
Type Value
UUID bd8ed465-7fc4-4e88-9554-81a9d5b31da0
Fingerprint 3746d952498307a8
Analysis status DONE
Considered CTI value 0
Text language
Published Sept. 7, 2018, 10:09 a.m.
Added to db Jan. 18, 2023, 7:36 p.m.
Last updated Nov. 17, 2024, 12:58 p.m.
Headline Pentesting IoT devices (Part 1: Static Analysis)
Title Pentesting IoT devices (Part 1: Static Analysis)
Detected Hints/Tags/Attributes 40/2/35
Attributes
Details Type #Events CTI Value
Details Domain 3
firmwalker.sh
Details Domain 1
vpn-passthru.sh
Details Domain 1
zcip.sh
Details Domain 1
pppoe.sh
Details Domain 1
config-igmpproxy.sh
Details Domain 1
web.sh
Details Domain 1
wan.sh
Details Domain 1
cameraname.sh
Details Domain 1
dhcp.sh
Details Domain 2
s80telnetd.sh
Details Domain 35
resources.infosecinstitute.com
Details Domain 4
firmwaresecurity.com
Details Domain 4
elinux.org
Details Domain 3
fkie-cad.github.io
Details File 1
dcs-932l_fw_v108_b2.bin
Details File 1
_dcs-932l_fw_v108_b2.bin
Details File 1
account.htm
Details File 36
resources.inf
Details IPv4 3
10.10.10.254
Details IPv4 141
255.255.255.0
Details IPv4 2
10.10.10.253
Details IPv4 1
10.10.10.251
Details IPv4 3
168.95.1.1
Details IPv4 619
0.0.0.0
Details IPv4 9
10.10.10.100
Details IPv4 3
10.10.10.200
Details IPv4 79
1.2.3.4
Details IPv4 1
1.5.6.1
Details IPv4 4
1.6.4.4
Details Url 1
https://reverseengineering.stackexchange.com/questions/15006/approach-to-extract-useful-information-from-binary-file
Details Url 1
https://www.pentestpartners.com/security-blog/using-hexdump-analysis-for-firmware-extraction-a-how-to
Details Url 1
https://resources.infosecinstitute.com/firmware-analysis-for-iot-devices
Details Url 1
https://firmwaresecurity.com
Details Url 1
http://elinux.org/file_systems
Details Url 3
https://fkie-cad.github.io/fact_core