Atlas probe hacking

MDSec labs posted a blog analyzing an  embedded device (‘IoT sensors’), trying to to assess the security of the device in order to determine if it could be compromised and leveraged to attack their client’s organization and/or customer infrastructure. They follow a standard methodology to access the device:
* Initial Hardware Communication to view the console output
* Gaining Interactive Console access gain a root shell
* Exploring the Device to determine weaknesses
* Conclusions: How can device secrets, data, and trusts be used to compromise further targets?

Full article:
https://www.mdsec.co.uk/2015/09/an-introduction-to-hardware-hacking-the-ripe-atlas-probe/

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s