how to pentest an IoT Web application
by moyepe123 - Sunday December 22, 2024 at 08:55 PM
#1
- identify entry points
- make an exhaustive list of the IoT ressources exposed.
Service buses, event hubs, mqtt brokers etc.
Keep in mind mqtt brokers are often left with no authentication.
- if the application exposes Apis : check the swagger looking for vulnérable endpoints ( look for the owap top 10 vulnerabilities ).
- use fuzzing techniques
Reply


Forum Jump:


 Users browsing this thread: 1 Guest(s)