Using Linux to Intercept IoT Device Traffic

Поделиться
HTML-код
  • Опубликовано: 6 фев 2025
  • mitmrouter on GitHub:
    github.com/nma...
    Need IoT pentesting or reverse engineering services?
    Please consider Brown Fine Security:
    brownfinesecur...
    IoT Hackers Hangout Community Discord Invite:
    / discord
    🛠️ Stuff I Use 🛠️
    🪛 Tools:
    Raspberry PI Pico: amzn.to/3XVMS3K
    XGecu Universal Programmer: amzn.to/4dIhNWy
    Handheld Multimeter: amzn.to/4b9cUUG
    Bench Multimeter: amzn.to/3YUjbQS
    Power Supply: amzn.to/3QBNSpb
    Oscilloscope: amzn.to/3UzoAZM
    Logic Analyzer: amzn.to/4a9IfFu
    USB UART Adapter: amzn.to/4dSbmjB
    iFixit Toolkit: amzn.to/44tTjMB
    🫠 Soldering & Hot Air Rework Tools:
    Soldering Station: amzn.to/4dygJEv
    Microsoldering Pencil: amzn.to/4dxPHwY
    Microsoldering Tips: amzn.to/3QyKhrT
    Rework Station: amzn.to/3JOPV5x
    Air Extraction: amzn.to/3QB28yx
    🔬 Microscope Setup:
    Microscope: amzn.to/4abMMao
    Microscope 0.7X Lens: amzn.to/3wrV1S8
    Microscope LED Ring Light: amzn.to/4btqiTm
    Microscope Camera: amzn.to/3QXSXsb
    About Me:
    My name is Matt Brown and I'm an Hardware Security Researcher and Bug Bounty Hunter. This channel is a place where I share my knowledge and experience finding vulnerabilities in IoT systems.
    Soli Deo Gloria
    💻 Social:
    website: brownfinesecur...
    twitter: / nmatt0
    linkedin: / mattbrwn
    github: github.com/nma...
    #hacking #iot #cybersecurity

Комментарии • 83

  • @I_hu85ghjo
    @I_hu85ghjo 5 месяцев назад +73

    Bro just keeps on going

    • @dmanistheshit
      @dmanistheshit 5 месяцев назад

      Heck yes! 😂

    • @Infiniband11
      @Infiniband11 5 месяцев назад

      U down with IoT yh u kno me*
      *Matt Brown

  • @lamerdan
    @lamerdan 5 месяцев назад +21

    Awesome stuff. Nothing better than a cup of coffee in the morning while consuming some IoT traffic interception YT content by a great engineer.

    • @funil6871
      @funil6871 5 месяцев назад +2

      Nothing better than a line of cocaine in the morning

  • @dingokidneys
    @dingokidneys 5 месяцев назад +4

    Nice tutorial. Amazing how easy it is to set up a 'router' in Linux. I did essentially the same thing with a Raspberry Pi some time ago so I have a 'router' on a micro SD card that I can plug in, power up and connect wireless stuff to either to isolate it or, as you do, to run packet captures on. Good fun and great learning experience.

  • @UNcommonSenseAUS
    @UNcommonSenseAUS 5 месяцев назад +8

    Keep crushing brother, amazing work

  • @RhizGh037
    @RhizGh037 5 месяцев назад +4

    Great Tutorial, even better script. Many "use cases" for this, great launch pad to learn scripting/networking... thanks Matt

  • @seabeepirate
    @seabeepirate Месяц назад

    I liked as soon as I opened the video because I already know I’m gonna watch to the end. Great content!

  • @XiSparks
    @XiSparks 5 месяцев назад +3

    This is fantastic. I have some IOT devices that I'm really looking forward to checking out with this.

  • @jdlucas78
    @jdlucas78 5 месяцев назад

    This is awesome. I have accomplished something similar using the Connection Sharing features available in the Net Manager GUI included with some distros including Kali, but your script is more in line with what I have been looking to do. It is infinitely more flexible.
    Enabling Connection Sharing in Windows also works for pretending to be a router with a DHCP server enabled that can be sniffed with Wire Shark, but configuration is extremely limited.
    Thanks for all you do!

  • @wkittredge
    @wkittredge 5 месяцев назад +2

    I see that Sneakers reference :) great movie! Been loving your videos - I have a network forensics/analysis course this semester that I'm looking forward to, and I hope to end up doing similar hardware security stuff.

    • @DustinMaki1
      @DustinMaki1 4 месяца назад

      I was wondering why RUclips recommended this video to me. Saw WIFI_SSID="setec_astronomy" and remembered RUclips also recommended Sneakers the day before. Is RUclips trying to influence the direction of hacking?

  • @michaelm249
    @michaelm249 5 месяцев назад

    found this channel yesterday, you're a great presenter! thank you! :)

  • @leonardoleite5475
    @leonardoleite5475 5 месяцев назад +18

    Nice job br0

    • @neilbryan6507
      @neilbryan6507 5 месяцев назад +1

      I see what you did there.

  • @asphyx3825
    @asphyx3825 5 месяцев назад +2

    Loving the content, Matt!

  • @nuclearmistake666
    @nuclearmistake666 5 месяцев назад +9

    Nice br0, bro

  • @roguesecurity
    @roguesecurity 5 месяцев назад

    Really love these videos and the very simple explanation. Kudos and great work Matt

  • @slablife
    @slablife 5 месяцев назад

    Wow, this channel is freaking gold!

  • @WangLees
    @WangLees 5 месяцев назад

    Bro_1 Sharing the knowledge. Nice work Matt, thanks for sharing

  • @gilmarrocha6551
    @gilmarrocha6551 5 месяцев назад

    Man, awesome stuff!!! Your videos are awesome! Please continue your amazing work!

  • @Johan-iw6mb
    @Johan-iw6mb 5 месяцев назад

    Thank you, very interesting. Gonna have lots of fun trying to decrypt all the data and understand it.

  • @linux42069
    @linux42069 5 месяцев назад

    I'm so glad I started following you

  • @Tier-rs1ox
    @Tier-rs1ox 5 месяцев назад

    My new favourite channel! 🎉

  • @asassdsdd
    @asassdsdd 5 месяцев назад

    Let's keep it coming, Matt! Let's go!!

  • @морс-ф3д
    @морс-ф3д 3 месяца назад

    Thank you a lot for your vids! Its very interesting and understandable!!!!!!!!)) you are Genius!!!!!!!!!

  • @glinkinivan
    @glinkinivan 5 месяцев назад

    Thanks Matt. very useful. Keep going please

  • @OLDMANDOM42.Dominic
    @OLDMANDOM42.Dominic 4 месяца назад

    Thanks Matt! I am guessing this is how we see how unruly our vacuum cleaners are! HA! Cheers!

  • @FuelTim
    @FuelTim 4 месяца назад

    Good vid and cool shirt!

  • @PaulJBrower
    @PaulJBrower 5 месяцев назад

    Great video, thanks for sharing!

  • @tehslackz0r
    @tehslackz0r 5 месяцев назад

    I am an arch fan too, come from openbsd and slackware. Good to know another distro gets some love that doesn't offer spoon feeding with a underwear change...

  • @larspregge6420
    @larspregge6420 5 месяцев назад

    Nice explanation. ty. Nice work too :D

  • @RippingLips23
    @RippingLips23 5 месяцев назад

    Nice shirt, love ur work, wish I had ur knowledge

  • @Starfire42
    @Starfire42 5 месяцев назад

    I see some affinity for the Sneakers movie... :)

  • @thegrumpytexan
    @thegrumpytexan 5 месяцев назад

    Awesome.. I have a couple of obscure devices - WiFi battery chargers - so you can keep an eye on your batteries on vehicles/toys/whatever (I use it on my tractor and UTV) but the company that makes them, doesn't keep up with the software (which is garbage) so now I can't see what's going on. This looks like a perfect project for a RPi Zero W with a PoE adapter on it.

  • @SanityIT
    @SanityIT 5 месяцев назад

    Have two of those cheap v380 cameras which seems to have only two ports open but cant get any video out from them. Trying to enable RTSP have been unsuccessful to retrieve any video but it uses its own app to see the video so somehow it must be transferring it. Will test this method to see if I can retrieve the video.
    As always Matt. Great stuff.

  • @chrisbsfx2003
    @chrisbsfx2003 2 месяца назад +1

    But what about certificate pinning when the outbound connection is looking for a https TLS1.2 connection?

  • @russtuff
    @russtuff 5 месяцев назад +1

    lol setec astronomy, nice reference.

  • @simphiwehlela5399
    @simphiwehlela5399 5 месяцев назад

    Amazing tutorial

  • @massimilianogilli1164
    @massimilianogilli1164 5 месяцев назад

    waiting also for the third level e.g. ssl stripping/mitm since i'm expecting most IoT devices establish a secure connection to their cloud

  • @Misimpa
    @Misimpa 5 месяцев назад +4

    br0
    br0_1
    br0_2
    etc 😂

  • @johnmacneil7921
    @johnmacneil7921 5 месяцев назад

    Another banger

  • @mikehensley78
    @mikehensley78 5 месяцев назад +1

    hell yeah

  • @lethal_larry
    @lethal_larry 5 месяцев назад

    new fav channel. A+

  • @murrij
    @murrij 29 дней назад

    Damn awesome.

  • @robertpalmer8925
    @robertpalmer8925 5 месяцев назад

    Oh wow, thank you!

  • @tayloredon2527
    @tayloredon2527 3 месяца назад

    Thank you

  • @petr0rabbit
    @petr0rabbit 5 месяцев назад +1

    embrace br0 :D

  • @neoninsv
    @neoninsv 5 месяцев назад

    Bonus for the SSID name

  • @theohoule3840
    @theohoule3840 5 месяцев назад +3

    I followed the exact same step and used my laptop's wifi as the wan interface and a USB dongle as the wifi interface. But I can't get internet on my phone connected to the wifi and I am pretty sure this is because dnsmasq uses port 53 which can't be used because systemd-resolved is already on it. If I change the port of dnsmasq then I won't have internet because all the DNS request from my phone will be sent to port 53 and thus receive no answer. If I shutdown systemd-resolved instead, then it is my laptop that can't connect to the internet and thus my phone doesn't internet by extension. Any idea how I may fix that? Is there a way to tell my phone to send DNS requests to a different port easily? Or can't I use systemd-resolved directly instead of dnsmasq?

    • @SlinkyD
      @SlinkyD 5 месяцев назад +2

      In `/etc/systemd/resolved.conf` change the stub setting to `DNSStubListiner=no` or you can change the addy it listens on. man 5 resolved.conf explain the details.

    • @theohoule3840
      @theohoule3840 5 месяцев назад

      @@SlinkyD Setting DNSStubListener=no did allow to use port 53 however I still don't have internet :/ When you say chance the addr it listens on, do you mean systemd-resolve ? If so I am not sure how to do this, I couldn't really figure out from the man page how to do this!

    • @SlinkyD
      @SlinkyD 5 месяцев назад

      @@theohoule3840 IIRC, its a setting in that conf. file where you do something like `ListenAddress=127.0.0.53:53` where you change it to something else. Not near a computer so I'm not sure of the setting name or syntax.
      The man page should have an explanation of the settings.

  • @Adam-linux
    @Adam-linux 5 месяцев назад

    keep going
    ❤💘

  • @Electrically-Electronic
    @Electrically-Electronic 5 месяцев назад +1

    I use ettercap to do an arp poisoning.

  • @csbluechip
    @csbluechip 5 месяцев назад

    I love shouting "try this" at the screen just before you do it ...I love more when your next words are "nahh, try this way ...bro" :)) ... TOO MANY SECRETS

  • @HollyTroll
    @HollyTroll 5 месяцев назад +1

    is this different in any way from creating a new hotspot (on a USB Wi-Fi adapter) via network manager then listen to it on Wireshark? or is this purely a look under the hood to understand how that works?

    • @mattbrwn
      @mattbrwn  5 месяцев назад +3

      Yeah this is probably how network manager does all that under the hood. I hate network manager and don't use it on any of my Linux systems as it does things automatically that I want precise control over.

  • @02ranger
    @02ranger 3 месяца назад

    Is this functionally any different from a port mirror on a switch, as far as the packets you see?

  • @locutusofborg
    @locutusofborg 5 месяцев назад

    Arch Linux Rules!! BlackArch is the bomb!

    • @mattbrwn
      @mattbrwn  5 месяцев назад

      I run regular arch linux but add the blackarch repos and pull some of that stuff in sometimes. However, over time I've noticed that you can get all the same tools in the official repos + AUR. I find most AUR repos to be better than the blackarch ones

    • @locutusofborg
      @locutusofborg 5 месяцев назад

      @@mattbrwn I have a spare computer just for blackarch.

  • @Bombexploid34
    @Bombexploid34 5 месяцев назад

    Hey I was wondering if you could make a video of you trying to hack the Belkin Wireless Router N300 I have seen you hack other belkin router I think and I want to see if you could try to hack this one too. Keep in mode that this router Telnet available so you can probably look at that since the telnet is vulnerable on that router

  • @CheatCraft
    @CheatCraft 5 месяцев назад

    Pardon me, but can I run it on a PC? or do I need specific wifi module with with an ability to do AP?

  • @donnievitelloni3806
    @donnievitelloni3806 5 месяцев назад

    Could have done all that arp poisoning with ettercap without having to set up a rogue AP

  • @konnorj6442
    @konnorj6442 5 месяцев назад

    Omfg 5min in les than 3psec of actual info
    Playback at 2x min to avoid a coma

  • @Me-kl9db
    @Me-kl9db Месяц назад

    Its not working for me, i even copied the password from the script to my iot device, and it keeps saying “wrong password”

  • @christoshaju2595
    @christoshaju2595 5 месяцев назад

    Which terminal is it?

  • @joeborders
    @joeborders 5 месяцев назад

    But how to run this from a client script in Chrome where the IoT device is my boss clicking a link? Asking for a friend.

  • @Moreton1983
    @Moreton1983 5 месяцев назад +2

    I think it's pronounced BRUH interface 😅

  • @_JoeMomma
    @_JoeMomma 3 месяца назад

    "The bro interface" 💀💀💀

  • @justin2221
    @justin2221 5 месяцев назад +4

    br0 interface lol

  • @leaveempty5320
    @leaveempty5320 5 месяцев назад

    IPv6 = No NAT!

  • @oldavguywholovesRCA
    @oldavguywholovesRCA 5 месяцев назад +1

    First!

  • @pupperozucca4994
    @pupperozucca4994 5 месяцев назад

    why Linux and not FreeBSD? I mean pfsense..

  • @JNET_Reloaded
    @JNET_Reloaded 5 месяцев назад

    can the lan and wan be the same interface? eth0?

  • @viniciusantunes9353
    @viniciusantunes9353 Месяц назад

    This command can be useful if you can connect but internet doesnt work:
    sudo sysctl -w net.ipv4.ip_forward=1
    net.ipv4.ip_forward=1 can be uncommented in /etc/sysctl.conf to persist when reboot

  • @Punkwart
    @Punkwart 5 месяцев назад

    You can also simply set up a hotspot with a laptop and connect the IoT to it and listen to the wifi iface ;) Either way, what should I do with encrypted wireshark traffic?

    • @Punkwart
      @Punkwart 5 месяцев назад +1

      I like connecting the smartphone/app to the hotspot, too. With a rooted device one gets the decrypted traffic (using burp e.g.) - sometimes the port and the commands if the IoT is setup for local communication :)

    • @SlinkyD
      @SlinkyD 5 месяцев назад +1

      Fuck around and find out something new.
      A few years ago, my brother came over when I was running a wireshark capture to pass time. It lit up when his phone & watch connected to wifi. I jumped down the rabbit hole and found out how to decrypt multicast packets for every device on my network.
      Wildest thing about it was a 5 line bash function I made to find all hosts on my network that has a `disown` and two redirects to /dev/null just to work. Removing any would make it fail.