Coder Social home page Coder Social logo

owasp / iotgoat Goto Github PK

View Code? Open in Web Editor NEW
629.0 23.0 112.0 208.3 MB

IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly found vulnerabilities in IoT devices.

Home Page: https://owasp.org/www-project-internet-of-things/

License: MIT License

Makefile 16.58% Shell 7.96% Lua 0.37% HTML 0.11% Awk 0.02% C 60.52% Assembly 1.78% C++ 5.17% M4 1.27% CMake 0.01% Perl 2.21% Lex 0.07% Yacc 0.14% Python 0.16% Roff 3.61% Objective-C 0.02%
iot-security-testing iot-security embedded-linux openwrt firmware firmware-security vulnerability-challenges owasp

iotgoat's Introduction

IoTGoat

Description

The IoTGoat Project is a deliberately insecure firmware based on OpenWrt and maintained by OWASP as a platform to educate software developers and security professionals with testing commonly found vulnerabilities in IoT devices. The vulnerability challenges are based on the OWASP IoT Top 10 noted below, as well as "easter eggs" from project contributors. For a list of vulnerability challenges, see the IoTGoat challenges wiki page.

OWASP IoT Top 10 2018 Description
I1 Weak, Guessable, or Hardcoded Passwords Use of easily bruteforced, publicly available, or unchangeable credentials, including backdoors in firmware or client software that grants unauthorized access to deployed systems.
I2 Insecure Network Services Unneeded or insecure network services running on the device itself, especially those exposed to the internet, that compromise the confidentiality, integrity/authenticity, or availability of information or allow unauthorized remote control.
I3 Insecure Ecosystem Interfaces Insecure web, backend API, cloud, or mobile interfaces in the ecosystem outside of the device that allows compromise of the device or its related components. Common issues include a lack of authentication/authorization, lacking or weak encryption, and a lack of input and output filtering.
I4 Lack of Secure Update Mechanism Lack of ability to securely update the device. This includes lack of firmware validation on device, lack of secure delivery (un-encrypted in transit), lack of anti-rollback mechanisms, and lack of notifications of security changes due to updates.
I5 Use of Insecure or Outdated Components Use of deprecated or insecure software components/libraries that could allow the device to be compromised. This includes insecure customization of operating system platforms, and the use of third-party software or hardware components from a compromised supply chain
I6 Insufficient Privacy Protection User’s personal information stored on the device or in the ecosystem that is used insecurely, improperly, or without permission.
I7 Insecure Data Transfer and Storage Lack of encryption or access control of sensitive data anywhere within the ecosystem, including at rest, in transit, or during processing
I8 Lack of Device Management Lack of security support on devices deployed in production, including asset management, update management, secure decommissioning, systems monitoring, and response capabilities.
I9 Insecure Default Settings Devices or systems shipped with insecure default settings or lack the ability to make the system more secure by restricting operators from modifying configurations.
I10 Lack of Physical Hardening Lack of physical hardening measures, allowing potential attackers to gain sensitive information that can help in a future remote attack or take local control of the device.

Getting started

Several methods exist to get started with hacking IoTGoat.

  1. For those looking to extract the filesystem, analyze configurations and binaries statically, download the latest precompiled firmware release from https://github.com/OWASP/IoTGoat/releases. Refer to OWASP's Firmware Security Testing Methodology to help with identifying vulnerabilities.

  2. For dynamic web testing and binary runtime analysis, the quickest way to get started is downloading the latest "IoTGoat-x86.vmdk" (VMware) and create a custom virtual machine using the IoTGoat disk image. Select the following operating system details Type: Linux Version: Linux 2.6 / 3.x / 4.x (32-bit) and Enable PAE/NX in virtual machine settings. Both the .vmdk and .vdi have been tested in the latest VirtualBox release (April 2020) for Windows 10, Ubuntu 18.04 LTS, and MacOS Mojave. Refer to OWASP's Web Security Testing Guide and ASVS projects for additional guidance on identifying web application vulnerabilities

  3. Emulate firmware with opensource tools (e.g. Firmadyne, ARM-X Framework, and FAT) that leverage QEMU to virtualize IoTGoat locally.

  4. Use the IoTGoat-raspberry-pi2-sysupgrade.img firmware to flash on a Raspberry Pi 2 (BRCM2708 & BRCM2709).

Refer to the Getting started page for additional details and screencaptures.

Building from source

OpenWrt can build many different CPU platforms and boards. Building from source gives users the flexibility to flash IoTGoat on supported OpenWrt hardware. Ensure 10-15GB disk space is available with at least 4GB of RAM and a supported Linux distribution such as Ubuntu 18.04. Use the following steps to get started with building custom firmware.

Do everything as a normal user, don't use root user or sudo when building!

$ git clone https://github.com/OWASP/IoTGoat.git
$ cd IoTGoat/OpenWrt/openwrt-18.06.2/
$ ./scripts/feeds update -a
$ ./scripts/feeds install -a
$ make menuconfig # select your preferred configuration for the toolchain, target system & firmware packages.
$ make # Build your firmware with make. This will download all sources, build the cross-compile toolchain and then cross-compile the Linux kernel & all chosen applications for your target system.

The first build will take some time to complete and will vary based on the provided internet connection for downloading the toolchain. Once a successful build is complete, the compiled firmware will be placed in the following directory IoTGoat/OpenWrt/openwrt-18.06.2/bin/targets/ depending on the target selected in menuconfig. For example, IoTGoat Raspberry Pi 2 firmware will be located in the following directory IoTGoat/OpenWrt/openwrt-18.06.2/bin/targets/brcm2708/bcm2709. IoTGoat build configuration files are made availble for x86 (.config-x86) and Raspberry Pi 2 (.config-rpi) platforms.

Project leaders

  • Aaron Guzman (@scriptingxss)
  • Fotios Chantzis
  • Paulino Calderon

Contributors

  • Parag Mhatre (@paraaagggg)
  • Abhinav Mohanty (cyanide284)
  • Jason Andress (@jandress)
  • @0x48piraj

Screenshots




License

The MIT License (MIT)

iotgoat's People

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

iotgoat's Issues

Mispelled CVE code in the "Launching the attack" section: OWASP/IoTGoat/wiki/Dnsmasq-exercise-setup

In the paragraph "Instructions to execute the PoC attack are provided in Google's security research repository. Refer to CVE-2017-14993-instructions.txt and CVE-2017-14993.py for this exercise. For simplicity, download the raw Python script (CVE-2017-14493.py) via wget, and execute it to send the payload targeting IoTGoat's statically configured IPv6 address at port 547 as shown below." the CVE code provided is incorrect.
CVE-2017-14993 is used instead of CVE-2017-14493.

v1.0 release versions seems not to be working

I downloaded the Raspberry Pi 2 image, used balenaEtcher to write it to the SD card. Then I had tried booting it in Raspberry Pi 4 , but all I got is just a black screen, I also tried to boot it in Raspberry Pi 2, but it just hangs with the rainbow screen. Both versions were tried (sysupgrade and the other one). Later on, I have tried using another software for writing to SD – Win32DiskImager. But that didn‘t helped. To make sure that this is not related to my machine, I used other computers to write to the card, but the effect is the same.

Some additional information
• OS that I use: Windows 10
• Size of the SD cards I‘ve tried to write to: 64 GB and 16 GB

I‘ve also tried VDI image with VirtualBox (version 6.1.4 r136177). It gets to the GRUB loader, but after this, it just crashes. From what I can see from logs, It looks like that it results in critical error when trying to boot the kernel.

I’ve also downloaded VMware to check if this would work, but unfortunately this seems to be not working also. After the grub loader screen, it starts booting, but at some point (crng init done), it just hangs. I’ve waited for about 40 minutes, but nothing progressed.

Not able to build from source

Hello. I am facing an error while building from the source. The error is regarding absence of gcc and g++ but in my kali linux virtual machine I have gcc and g++ v13.1.0.
IoTGoat

VM won't start

Hello, idk why but i have an error when I start the VM on VirtualBox and VmWare Workstation Pro 16

Errors:
image
image

port 5000 closed by default?

upnp port 5000 seems to be closed. tired restarting the machine (VM in oracle virtual box). do I need to activate upnp service myself?
issue

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.