IoT Security Institute

IoT Security Testing and Exploitation Framework

Thanks! Share it with your friends!


You disliked this video. Thanks for the feedback!

Sorry, only registred users can create playlists.

Added by IoTSIMedia in IoT Security


Welcome to OWASP Hacker Thursday's YouTube!

Enjoy these amazing talks from August meetups by OWASP Bay Area. For more details about past and upcoming meetups, visit the Meetup page:

To contribute to Hacker Thursday as a speaker or would like to host us, email us at owaspht[at]gmail[dot].com

After working on IoT security testing for a few years, we realized that there is a lot of time spent on learning and setting up different tools including hardware, radio and software. As the IoT technology is new there are no standard software to test most of the components and the tools available are either not mature yet or do only specific job. With this problem at hand we envisioned a software that would allow developers and researchers to automate most of the IoT security testing steps. We began our journey with writing a flexible and extendable framework that would help the community and us in writing quick IoT test cases and exploits.
The objectives of the framework are:
1. Easy of use
2. Extendable
3. Support for hardware, radio and IoT protocol analysis

We have released the alpha version of the framework recently -
The beta release is envisioned to have support for UART(serial), ZigBee, BLE, MQTT, CoAP (next version will have support for JTAG, I2C and SPI) and few miscellaneous test cases, exploits. This workshop would give attendees a first hand view of the functionality, how to use it and how to write plugins to extend the framework.

Speaker Bio
Aseem Jakhar is the Director R&D at Payatu Software Labs LLP, a boutique security testing organization with specialization in IoT, embedded, mobile and cloud security. He is a speaker and trainer at international security conferences like Blackhat, Hack in Paris, Brucon, Hack in the box, Defcon, Zer0con, PHDays to name a few. He is also an open source developer and has written various open source security projects including - Indroid/Jugaad - Runtime Thread injection toolkit for Arm/x86, Dexfuzzer - A dumb fuzzer for dex files, DIVA Android - Damn Insecure and Vulnerable App for Android and Expliot framework.
- Expliot (Ruby) -
- DIVA Android -
- Indroid -
- Jugaad -
- Dexfuzzer -

Aseem Jakhar
Co-Founder/Director, Research, Payatu Software Labs
Co-Founder: null - The open security community
nullcon Security Conference - Hardware Security Conference

Post your comment


Be the first to comment