Summary

In this chapter, we took a quick journey into basic embedded systems and their architecture, and we learned about different types of firmwares, bootloaders, UART, radio sniffing, and common tools that can be utilized during a hardware hacking. We also learned how to unpack a firmware and load a new firmware on a router using USBJtag NT, and we explored using RouterSploit to identify the specific vulnerabilities in the embedded devices. Finally, we learned how to clone a physical RFID/NFC card using a Chameleon Mini, which can be utilized during red teaming exercises.

We hope this book has helped you to understand the fundamental risks and how attackers use these tools to compromise networks/devices within a few seconds, and how you can use the same tools and techniques to understand your infrastructure vulnerabilities, as well as the importance of remediation and patch management before your own infrastructure is compromised. On that note, this chapter concludes Mastering Kali Linux for Advanced Penetration Testing – Third Edition.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.145.186.6