How to find and exploit vulnerabilities in IoT devices
We will begin working on our IoT device by performing basic physical analysis, looking into previous research, doing a mix of dynamic and static analysis to understand better how to exploit the vulnerabilities, and finally, creating and using a reverse shell.
Basic physical analysis
When we have the Shadow device in front of us, we can gather valuable information by examining its external features:
Figure 5.1 – Back of the Shadow device
If we turn it over, we can read details such as the following:
- Name:
GL.iNet 300M Mini
Smart Router
- Model:
GL-AR300M16
- IP:
192.168.8.1
- SSID:
GL-AR300M-***-***
- Key:
goodlife
- MAC:
98:83:C4:**:**:**
- S/N:
************
- DDNS:
***.gl-inet.com
We can also find crucial identification codes, such as the following:
- FCC ID (the device ID registered with the United States Federal Communications Commission):
2AFIW-AR300M16...