12-22-2024, 08:55 PM
- identify entry points
- make an exhaustive list of the IoT ressources exposed.
Service buses, event hubs, mqtt brokers etc.
Keep in mind mqtt brokers are often left with no authentication.
- if the application exposes Apis : check the swagger looking for vulnérable endpoints ( look for the owap top 10 vulnerabilities ).
- use fuzzing techniques
- make an exhaustive list of the IoT ressources exposed.
Service buses, event hubs, mqtt brokers etc.
Keep in mind mqtt brokers are often left with no authentication.
- if the application exposes Apis : check the swagger looking for vulnérable endpoints ( look for the owap top 10 vulnerabilities ).
- use fuzzing techniques