• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Week 1: Course Introduction
      • Week 2: Meterpreter, Avoiding Detection, Client Side Attacks, and Auxiliary Modules
      • Week 3: Social Engineering Toolkit, SQL Injection, Karmetasploit, Building Modules in Metasploit, and Creating Exploits
      • Week 4: Porting Exploits, Scripting, and Simulating Penetration Testing
      • Week 5: Independent Study – Perform Metasploit Attack and Create Presentation
      • Week 6: Ettercap
      • Week 7: Introduction to OWASP’s WebGoat application
    • Second Half of the Semester
      • Week 8: Independent Study
      • Week 9: Introduction to Wireless Security
      • Week 10: Wireless Recon, WEP, and WPA2
      • Week 11: WPA2 Enterprise, Wireless beyond WiFi
      • Week 12: Jack the Ripper, Cain and Able, Delivery of Sample Operating Systems
      • Week 13: Independent Study – Analyze provided Operating System Samples and Create Assessment Report
      • Week 14: Deliver Assessment to Operating System Class either in person or via teleconferenc
  • Assignments
    • Analysis Reports
    • Group Project Report and Presentation
  • Webex
  • Harvard Coursepack
  • Gradebook

MIS 5212-Advanced Penetration Testing

MIS 5212 - Section 001 - Wade Mackey

Fox School of Business

New Metasploit Extension Available for Testing IoT Device Security

March 21, 2017 by Mengqi He 1 Comment

New RF Transceiver extension for the Metasploit Hardware Bridge API now is available for organizations to detect and scan wireless IoT devices operating outside the standard 802.11 specification. The new extension further broadens the use cases for Metasploit. It is designed for enabling organizations to craft and monitor different RF packets for identifying and assessing the security state of multi-frequency wireless devices more effectively than current tools. It allows pen testers to create and direct “short bursts of interference” at such devices to see how they respond from a security standpoint. One of the greatest threats of wireless IoT devices is the unauthorized access to the information that those devices have access to. For example, a smart lighting system with both RF and WiFi components may be attacked on the RF side to get access to the WiFi side. In addition, many RF-enabled devices fail to serialize or otherwise make sure that each request and response is unique, and therefore are vulnerable to issues like replay attacks. Since organizations are expected to connect a constantly growing range of wireless IoT devices, it’s important to increase the RF testing capabilities.

Link: http://www.darkreading.com/threat-intelligence/new-metasploit-extension-available-for-testing-iot-device-security/d/d-id/1328452

 

 

Filed Under: Week 09 Tagged With:

Reader Interactions

Comments

  1. Mauchel Barthelemy says

    March 25, 2017 at 12:35 pm

    Thank you Mengqi for this article. I believe this Metasploit extension is a crucial step towards improving IoT security. Pen-testers and companies should take full advantage of this to stay a couple steps ahead of the bad guys.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (35)
  • Week 01 (2)
  • Week 02 (14)
  • Week 03 (13)
  • Week 04 (10)
  • Week 05 (7)
  • Week 06 (29)
  • Week 07 (8)
  • Week 08 (1)
  • Week 09 (6)
  • Week 10 (12)
  • Week 11 (7)
  • Week 12 (4)
  • Week 13 (6)
  • Week 14 (18)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in