Summary
In this chapter, we learned how to analyze IoT devices using their components and where to find IoT devices in industrial control system networks. We also saw how to find and exploit vulnerabilities in IoT devices using basic physical analysis. Then, we learned how to download and extract the firmware and emulate the firmware, and reverse binaries from Ghidra. Then, we explored how to exploit Abuse of Functionalities and parameter injection, even if command injection is fixed, and how to exploit a path traversal. We also learned how to create a reverse shell for OpenWrt.
We want to conclude with a brief note on industrial network security. Exploiting vulnerabilities in industrial devices has always been intriguing, and we’ve reported such vulnerabilities in the past [51]. However, while traveling globally to evaluate industrial network risks, we recognized the importance of understanding these networks’ structures and the types of devices they house beyond...