Skip to content

kzLiu2017/RIoTFuzzer

Repository files navigation

RIoTFuzzer: Companion App Assisted Remote Fuzzing for Detecting Vulnerabilities in IoT Devices

Demo

  1. First reverse engineer the companion app with apktool (take JD Home app as example)
  java -jar apktool.jar d jd_1.9.2_126_com.jd.iots_main_standalone.apk
  1. Finding the border fucntion
  python3 find_jsinterfacemethod.py
  1. Construct the call graph (optional)
  androguard cg XX.apk -o callgraph.gml
  1. Identify the mutation point
    • Configure the target_function in the find_mutation_point_with_hook.js to the border functions found in step 2.
    • Run the frida server in Android phone
    • find mutation point with frida
      frida -U com.jd.iots -l find_mutation_point_with_hook.js
    
    • If does not identify the control command, perform further call graph analysis
      python3 analyze_cg.py
    
  2. After discovering the mutation point, start data type infer
  frida -U com.jd.iots -l mutation_with_hook.js
  1. Infer the cloud server validation with
  python3 data_type_infer_traffic_analysis.py

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published