{"id":3373,"date":"2017-03-21T19:28:48","date_gmt":"2017-03-21T23:28:48","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/?p=3373"},"modified":"2017-03-21T19:28:48","modified_gmt":"2017-03-21T23:28:48","slug":"new-metasploit-extension-available-for-testing-iot-device-security","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/2017\/03\/21\/new-metasploit-extension-available-for-testing-iot-device-security\/","title":{"rendered":"New Metasploit Extension Available for Testing IoT Device Security"},"content":{"rendered":"<p>New RF Transceiver extension for the Metasploit Hardware Bridge API now is available for organizations to detect and scan wireless IoT devices operating outside the standard 802.11 specification. The new extension further broadens the use cases for Metasploit. It is designed for enabling organizations to craft and monitor different RF packets for identifying and assessing the security state of multi-frequency wireless devices more effectively than current tools. It allows pen testers to create and direct \u201cshort bursts of interference\u201d at such devices to see how they respond from a security standpoint. One of the greatest threats of wireless IoT devices is the unauthorized access to the information that those devices have access to. For example, a smart lighting system with both RF and WiFi components may be attacked on the RF side to get access to the WiFi side. In addition, many RF-enabled devices fail to serialize or otherwise make sure that each request and response is unique, and therefore are vulnerable to issues like replay attacks. Since organizations are expected to connect a constantly growing range of wireless IoT devices, it\u2019s important to increase the RF testing capabilities.<\/p>\n<p>Link: <a href=\"http:\/\/www.darkreading.com\/threat-intelligence\/new-metasploit-extension-available-for-testing-iot-device-security\/d\/d-id\/1328452\">http:\/\/www.darkreading.com\/threat-intelligence\/new-metasploit-extension-available-for-testing-iot-device-security\/d\/d-id\/1328452<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>New RF Transceiver extension for the Metasploit Hardware Bridge API now is available for organizations to detect and scan wireless IoT devices operating outside the standard 802.11 specification. The new extension further broadens the use cases for Metasploit. It is designed for enabling organizations to craft and monitor different RF packets for identifying and assessing [&hellip;]<\/p>\n","protected":false},"author":11323,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[716552],"tags":[],"class_list":{"0":"post-3373","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-09-it-outsourcing-cloud-computing","7":"entry"},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8j0Bl-Sp","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts\/3373","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/users\/11323"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/comments?post=3373"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts\/3373\/revisions"}],"predecessor-version":[{"id":3374,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts\/3373\/revisions\/3374"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/media?parent=3373"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/categories?post=3373"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/tags?post=3373"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}