Archives

Security Support for Iot Device Using Pentration Testing Tools


N. Kanya, N. Sharmila and S. Geetha
Abstract

The Internet of Thing (IoT) innovation has been developing quickly with numerous executions. Nonetheless, due to its capacity to perform undertakings and handle the touchy data and furthermore the lack of client security mindfulness, IoT gadgets contain numerous potential dangers and are the new focus of assaults. In this paper, we build up an entrance testing framework for IoT gadgets considered PENTOS so as to expand the client security mindfulness. The framework accompanies the GUI running on Kali Linux which is particularly intended for moral hacking. PENTOS consequently accumulates the data of the objective IoT gadget through the remote correspondence, which are WiFi and Bluetooth. The framework enables clients to perform different sorts of penetration testing on their IoT gadgets, for example, the secret key assault, web assault, and remote assault so as to pick up the benefit access by various calculations. Besides, the framework additionally gives the fundamental security direction as indicated by the OWASP's Top 10 IoT Vulnerabilities to teach clients and increment the security mindfulness. After the penetration testing, the framework at that point outlines the aftereffects of every single assaulting module and gives the proposals for the safe sending to maintain a strategic distance from conceivable dangers.

Volume 11 | 04-Special Issue

Pages: 2321-2326