How to do it...

For this exercise, we will require and use the following tools and utilities:

  • Damn Vulnerable Router Firmware (DVRF) - downloadable from the GitHub URL
  • GDB-Multiarch
  • GDB Enhanced Features (GEF)
  • QEMU
  • chroot
  • IDA Pro/Radare2 (optional)

Let's go through each of them one by one and see how to set them up. Let's go ahead and download the DVRF firmware from the following URL: https://github.com/praetorian-inc/DVRF/tree/master/Firmware.

DVRF is a firmware written by b1ack0wl with the firmware meant for the MIPS-based platforms. Even though the firmware is intended for Linksys E1550, it could be run in an emulated environment using QEMU which also includes performing of exploitation:

  1. Now that we have the firmware with us, let's ...

Get IoT Penetration Testing Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.