{"id":6977,"date":"2019-10-21T16:41:31","date_gmt":"2019-10-21T11:11:31","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=6977"},"modified":"2019-10-21T16:41:31","modified_gmt":"2019-10-21T11:11:31","slug":"cotopaxi","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/cotopaxi\/","title":{"rendered":"Cotopaxi : Set Of Tools For Security Testing Of Internet Of Things Devices Using Specific Network IoT Protocols"},"content":{"rendered":"\n<p><strong>Cotopaxi<\/strong> set of tools for security testing of Internet of Things devices using protocols like: CoAP, DTLS, HTCPCP, mDNS, MQTT, SSDP.<\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Requirements<\/strong><\/p>\n\n\n\n<p>Currently Cotopaxi works only with Python 2.7.x, but future versions will work also with Python 3.<\/p>\n\n\n\n<p>If you have previous installation of scapy without scapy-ssl_tls, please remove it or use venv.<\/p>\n\n\n\n<p><strong>Installation of main libraries:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>scapy-ssl_tls (this will install also scapy in 2.4.2)<\/li><\/ul>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>pip install git+https:\/\/github.com\/tintinweb\/scapy-ssl_tls@ec5714d560c63ea2e0cce713cec54edc2bfa0833 <\/strong><\/p>\n\n\n\n<p><strong>Common problems:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>If you encounter error:&nbsp;<code><strong>error: [Errno 2] No such file or directory: 'LICENSE'<\/strong><\/code>, try repeating command &#8211; surprisingly it works.<\/li><li>If you encounter error:&nbsp;<code><strong>NameError: name 'os' is not defined<\/strong><\/code>&nbsp;&#8211; add missing&nbsp;<code><strong>import os<\/strong><\/code>&nbsp;to&nbsp;<code><strong>scapy\/layers\/ssl_tls.py<\/strong><\/code>.<\/li><\/ul>\n\n\n\n<p style=\"text-align:center\"><strong>Also Read &#8211; <a href=\"https:\/\/kalilinuxtutorials.com\/unicorn-bios\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Unicorn-Bios : Basic BIOS Emulator for Unicorn Engine (opens in a new tab)\">Unicorn-Bios : Basic BIOS Emulator for Unicorn Engine<\/a><\/strong><\/p>\n\n\n\n<p>All other required packages can be installed using requirements.txt file:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>pip install -r cotopaxi\/requirements.txt <\/strong><\/p>\n\n\n\n<p>Manual installation of other required packages:<\/p>\n\n\n\n<p style=\"text-align:left\" class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>pip install dnslib IPy hexdump pyyaml psutil enum34 configparser <\/strong><\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><a href=\"https:\/\/github.com\/Samsung\/cotopaxi#disclaimer\"><\/a><strong>Disclaimer<\/strong><\/p>\n\n\n\n<p>Cotopaxi toolkit is intended to be used only for authorized security testing!<\/p>\n\n\n\n<p>Some tools (especially vulnerability tester and protocol fuzzer) can cause some devices or servers to stop acting in the intended way &#8212; for example leading to crash or hang of tested entities or flooding with network traffic another entities.<\/p>\n\n\n\n<p>Make sure you have permission from the owners of tested devices or servers before running these tools!<\/p>\n\n\n\n<p>Make sure you check with your local laws before running these tools!<\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><a href=\"https:\/\/github.com\/Samsung\/cotopaxi#tools-in-this-package\"><\/a><strong>Tools in this package<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>service_ping<\/li><li>server_fingerprinter<\/li><li>resource_listing<\/li><li>server_fingerprinter<\/li><li>protocol_fuzzer (for fuzzing servers)<\/li><li>client_proto_fuzzer (for fuzzing clients)<\/li><li>vulnerability_tester (for testing servers)<\/li><li>client_vuln_tester (for testing clients)<\/li><li>amplifier_detector<\/li><\/ul>\n\n\n\n<p>Protocols supported by different tools:<\/p>\n\n\n\n<table class=\"wp-block-table\"><thead><tr><th>Tool<\/th><th>CoAP<\/th><th>DTLS<\/th><th>HTCPCP<\/th><th>mDNS<\/th><th>MQTT<\/th><th>SSDP<\/th><\/tr><\/thead><tbody><tr><td>service_ping<\/td><td>\u2611<\/td><td>\u2611<\/td><td>\u2611<\/td><td>\u2611<\/td><td>\u2611<\/td><td>\u2611<\/td><\/tr><tr><td>server_fingerprinter<\/td><td>\u2611<\/td><td>\u2611<\/td><td><\/td><td><\/td><td><\/td><td><\/td><\/tr><tr><td>resource_listing<\/td><td>\u2611<\/td><td><\/td><td><\/td><td>\u2611<\/td><td><\/td><td>\u2611<\/td><\/tr><tr><td>protocol_fuzzer<\/td><td>\u2611<\/td><td>\u2611<\/td><td>\u2611<\/td><td>\u2611<\/td><td>\u2611<\/td><td>\u2611<\/td><\/tr><tr><td>client_proto_fuzzer<\/td><td>\u2611<\/td><td>\u2611<\/td><td>\u2611<\/td><td>\u2611<\/td><td>\u2611<\/td><td>\u2611<\/td><\/tr><tr><td>vulnerability_tester<\/td><td>\u2611<\/td><td>\u2611<\/td><td>\u2611<\/td><td>\u2611<\/td><td>\u2611<\/td><td>\u2611<\/td><\/tr><tr><td>client_vuln_tester<\/td><td>\u2611<\/td><td>\u2611<\/td><td>\u2611<\/td><td>\u2611<\/td><td>\u2611<\/td><td>\u2611<\/td><\/tr><tr><td>amplifier_detector<\/td><td>\u2611<\/td><td>\u2611<\/td><td><\/td><td>\u2611<\/td><td><\/td><td>\u2611<\/td><\/tr><\/tbody><\/table>\n\n\n\n<p><strong>cotopaxi.service_ping<\/strong><\/p>\n\n\n\n<p>Tool for checking availability of network service at given IP and port ranges<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\">usage: sudo python -m cotopaxi.service_ping [-h] [-v] [&#8211;protocol {UDP,TCP,CoAP,MQTT,DTLS,ALL}]<br>                        [&#8211;src-port SRC_PORT]<br>                        dest_ip dest_port<br> positional arguments:<br>   dest_ip               destination IP address or multiple IPs separated by<br>                         coma (e.g. &#8216;1.1.1.1,2.2.2.2&#8217;) or given by CIDR netmask<br>                         (e.g. &#8216;10.0.0.0\/22&#8217;) or both<br>   dest_port             destination port or multiple ports given by list<br>                         separated by coma (e.g. &#8216;8080,9090&#8217;) or port range<br>                         (e.g. &#8216;1000-2000&#8217;) or both<br> optional arguments:<br>   -h, &#8211;help            show this help message and exit<br>   &#8211;retries RETRIES, -R RETRIES<br>                         number of retries<br>   &#8211;timeout TIMEOUT, -T TIMEOUT<br>                         timeout in seconds<br>   &#8211;verbose, -V, &#8211;debug, -D<br>                         Turn on verbose\/debug mode (more messages)<br>   &#8211;protocol {UDP,TCP,CoAP,mDNS,SSDP,MQTT,DTLS,ALL,HTCPCP}, -P {UDP,TCP,CoAP,mDNS,SSDP,MQTT,DTLS,ALL,HTCPCP}<br>                         protocol to be tested (UDP includes CoAP, DTLS, mDNS,<br>                         and SSDP, TCP includes CoAP, HTCPCP, and MQTT, ALL<br>                         includes all supported protocols)<br>   &#8211;src-port SRC_PORT, -SP SRC_PORT<br>                         source port (if not specified random port will be<br>                         used)<\/p>\n\n\n\n<p><strong>cotopaxi.server_fingerprinter<\/strong><\/p>\n\n\n\n<p>Tool for software fingerprinting of network servers at given IP and port ranges<\/p>\n\n\n\n<p>Currently supported servers:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>CoAP<\/strong>:<ul><li>aiocoap,<\/li><li>CoAPthon,<\/li><li>FreeCoAP,<\/li><li>libcoap,<\/li><li>MicroCoAP,<\/li><li>Mongoose<\/li><li>Wakaama (formerly liblwm2m)<\/li><\/ul><\/li><li><strong>DTLS<\/strong>:<ul><li>GnuTLS,<\/li><li>Goldy,<\/li><li>LibreSSL,<\/li><li>MatrixSSL,<\/li><li>mbed TLS,<\/li><li>OpenSSL,<\/li><li>TinyDTLS<\/li><\/ul><\/li><\/ul>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\">usage: sudo python -m cotopaxi.server_fingerprinter [-h] [&#8211;retries RETRIES] [&#8211;timeout TIMEOUT]<br>                                [&#8211;verbose]<br>                                [&#8211;protocol {CoAP,DTLS}]<br>                                [&#8211;src-port SRC_PORT]<br>                                dest_ip dest_port<br> positional arguments:<br>   dest_ip               destination IP address or multiple IPs separated by<br>                         coma (e.g. &#8216;1.1.1.1,2.2.2.2&#8217;) or given by CIDR netmask<br>                         (e.g. &#8216;10.0.0.0\/22&#8217;) or both<br>   dest_port             destination port or multiple ports given by list<br>                         separated by coma (e.g. &#8216;8080,9090&#8217;) or port range<br>                         (e.g. &#8216;1000-2000&#8217;) or both<br> optional arguments:<br>   -h, &#8211;help            show this help message and exit<br>   &#8211;retries RETRIES, -R RETRIES<br>                         number of retries<br>   &#8211;timeout TIMEOUT, -T TIMEOUT<br>                         timeout in seconds<br>   &#8211;verbose, -V, &#8211;debug, -D<br>                         Turn on verbose\/debug mode (more messages)<br>   &#8211;protocol {CoAP,DTLS}, -P {CoAP,DTLS}<br>                         protocol to be tested<br>   &#8211;src-port SRC_PORT, -SP SRC_PORT<br>                         source port (if not specified random port will be<br>                         used)<br>   &#8211;ignore-ping-check, -Pn<br>                         ignore ping check (treat all ports as alive)<\/p>\n\n\n\n<p><strong>cotopaxi.resource_listing<\/strong><\/p>\n\n\n\n<p>Tool for checking availability of resource named url on server at given IP and port ranges. Sample URL lists are available in the&nbsp;<em>urls<\/em>&nbsp;directory<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\">usage: sudo python -m cotopaxi.resource_listing [-h] [-v] [&#8211;protocol {CoAP,ALL}]<br>                            [&#8211;method {GET,POST,PUT,DELETE,ALL}]<br>                            [&#8211;src-port SRC_PORT]<br>                            dest_ip dest_port url_filepath<br> positional arguments:<br>   dest_ip               destination IP address or multiple IPs separated by<br>                         coma (e.g. &#8216;1.1.1.1,2.2.2.2&#8217;) or given by CIDR netmask<br>                         (e.g. &#8216;10.0.0.0\/22&#8217;) or both<br>   dest_port             destination port or multiple ports given by list<br>                         separated by coma (e.g. &#8216;8080,9090&#8217;) or port range<br>                         (e.g. &#8216;1000-2000&#8217;) or both<br>   url_filepath          path to file with list of URLs to be tested (each URL<br>                         in separated line)<br> optional arguments:<br>   -h, &#8211;help            show this help message and exit<br>   &#8211;retries RETRIES, -R RETRIES<br>                         number of retries<br>   &#8211;timeout TIMEOUT, -T TIMEOUT<br>                         timeout in seconds<br>   &#8211;verbose, -V, &#8211;debug, -D<br>                         Turn on verbose\/debug mode (more messages)<br>   &#8211;protocol {CoAP,mDNS,SSDP}, -P {CoAP,mDNS,SSDP}<br>                         protocol to be tested<br>   &#8211;method {GET,POST,PUT,DELETE,ALL}, -M {GET,POST,PUT,DELETE,ALL}<br>                         methods to be tested (ALL includes all supported<br>                         methods)<br>   &#8211;src-port SRC_PORT, -SP SRC_PORT<br>                         source port (if not specified random port will be<br>                         used)<br>   &#8211;ignore-ping-check, -Pn<br>                         ignore ping check (treat all ports as alive)<\/p>\n\n\n\n<p><strong>cotopaxi.protocol_fuzzer<\/strong><\/p>\n\n\n\n<p>Black-box fuzzer for testing protocol servers<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\">usage: sudo python -m cotopaxi.protocol_fuzzer <br>                           [-h] [&#8211;retries RETRIES] [&#8211;timeout TIMEOUT]<br>                           [&#8211;verbose] [&#8211;protocol {CoAP,mDNS,MQTT,DTLS}]<br>                           [&#8211;src-ip SRC_IP] [&#8211;src-port SRC_PORT]<br>                           [&#8211;ignore-ping-check] [&#8211;corpus-dir CORPUS_DIR]<br>                           dest_ip dest_port<br> positional arguments:<br>   dest_ip               destination IP address or multiple IPs separated by<br>                         coma (e.g. &#8216;1.1.1.1,2.2.2.2&#8217;) or given by CIDR netmask<br>                         (e.g. &#8216;10.0.0.0\/22&#8217;) or both<br>   dest_port             destination port or multiple ports given by list<br>                         separated by coma (e.g. &#8216;8080,9090&#8217;) or port range<br>                         (e.g. &#8216;1000-2000&#8217;) or both<br> optional arguments:<br>   -h, &#8211;help            show this help message and exit<br>   &#8211;retries RETRIES, -R RETRIES<br>                         number of retries<br>   &#8211;timeout TIMEOUT, -T TIMEOUT<br>                         timeout in seconds<br>   &#8211;verbose, -V, &#8211;debug, -D<br>                         Turn on verbose\/debug mode (more messages)<br>   &#8211;protocol {CoAP,mDNS,MQTT,DTLS,SSDP,HTCPCP}, -P {CoAP,mDNS,MQTT,DTLS,SSDP,HTCPCP}<br>                         protocol to be tested<br>   &#8211;hide-disclaimer, -HD<br>                         hides legal disclaimer (shown before starting<br>                         intrusive tools)<br>   &#8211;src-ip SRC_IP, -SI SRC_IP<br>                         source IP address (return result will not be<br>                         received!)<br>   &#8211;src-port SRC_PORT, -SP SRC_PORT<br>                         source port (if not specified random port will be<br>                         used)<br>   &#8211;ignore-ping-check, -Pn<br>                         ignore ping check (treat all ports as alive)<br>   &#8211;corpus-dir CORPUS_DIR, -C CORPUS_DIR<br>                         path to directory with fuzzing payloads (corpus) (each<br>                         payload in separated file)<br>   &#8211;delay-after-crash DELAY_AFTER_CRASH, -DAC DELAY_AFTER_CRASH<br>                         number of seconds that fuzzer will wait after crash<br>                         for respawning tested server<\/p>\n\n\n\n<p><strong>cotopaxi.client_proto_fuzzer<\/strong><\/p>\n\n\n\n<p>Black-box fuzzer for testing protocol clients<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\">usage: sudo client_proto_fuzzer.py [-h] [&#8211;server-ip SERVER_IP]<br>                               [&#8211;server-port SERVER_PORT]<br>                               [&#8211;protocol {CoAP,mDNS,MQTT,DTLS,SSDP,HTCPCP}]<br>                               [&#8211;verbose] [&#8211;corpus-dir CORPUS_DIR]<br> optional arguments:<br>   -h, &#8211;help            show this help message and exit<br>   &#8211;server-ip SERVER_IP, -SI SERVER_IP<br>                         IP address, that will be used to set up tester server<br>   &#8211;server-port SERVER_PORT, -SP SERVER_PORT<br>                         port that will be used to set up server<br>   &#8211;protocol {CoAP,mDNS,MQTT,DTLS,SSDP,HTCPCP}, -P {CoAP,mDNS,MQTT,DTLS,SSDP,HTCPCP}<br>                         protocol to be tested<br>   &#8211;verbose, -V, &#8211;debug, -D<br>                         Turn on verbose\/debug mode (more messages)<br>   &#8211;corpus-dir CORPUS_DIR, -C CORPUS_DIR<br>                         path to directory with fuzzing payloads (corpus) (each<br>                         payload in separated file)<\/p>\n\n\n\n<p><strong>cotopaxi.vulnerability_tester<\/strong><\/p>\n\n\n\n<p>Tool for checking vulnerability of network service at given IP and port ranges<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\">usage: sudo python -m cotopaxi.vulnerability_tester [-h] [-v]<br>                                [&#8211;cve {ALL,CVE-2018-19417,\u2026}]<br>                                [&#8211;list LIST] [&#8211;src-port SRC_PORT]<br>                                dest_ip dest_port<br> positional arguments:<br>   dest_ip               destination IP address or multiple IPs separated by<br>                         coma (e.g. &#8216;1.1.1.1,2.2.2.2&#8217;) or given by CIDR netmask<br>                         (e.g. &#8216;10.0.0.0\/22&#8217;) or both<br>   dest_port             destination port or multiple ports given by list<br>                         separated by coma (e.g. &#8216;8080,9090&#8217;) or port range<br>                         (e.g. &#8216;1000-2000&#8217;) or both<br> optional arguments:<br>   -h, &#8211;help            show this help message and exit<br>   &#8211;retries RETRIES, -R RETRIES<br>                         number of retries<br>   &#8211;timeout TIMEOUT, -T TIMEOUT<br>                         timeout in seconds<br>   &#8211;protocol {UDP,TCP,CoAP,mDNS,MQTT,DTLS,ALL}, -P {UDP,TCP,CoAP,mDNS,MQTT,DTLS,ALL}<br>                         protocol to be tested (UDP includes CoAP, mDNS and<br>                         DTLS, TCP includes CoAP and MQTT, ALL includes all<br>                         supported protocols)<br>   &#8211;hide-disclaimer, -HD<br>                         hides legal disclaimer (shown before starting<br>                         intrusive tools)<br>   &#8211;verbose, -V, &#8211;debug, -D<br>                         Turn on verbose\/debug mode (more messages)<br>   &#8211;cve {ALL,CVE-2018-19417,\u2026}<br>                         list of vulnerabilities to be tested (by CVE id)<br>   &#8211;vuln {ALL,BOTAN_000,COAPTHON3_000,\u2026} <br>                         list of vulnerabilities to be tested (by SOFT_NUM id)<br>&#8211;list, -L            display lists of all vulnerabilities supported by this<br>                         tool with detailed description<br>   &#8211;src-port SRC_PORT, -SP SRC_PORT<br>                         source port (if not specified random port will be<br>                         used)<br>   &#8211;ignore-ping-check, -Pn<br>                         ignore ping check (treat all ports as alive)<\/p>\n\n\n\n<p><strong>cotopaxi.client_vuln_tester<\/strong><\/p>\n\n\n\n<p>Tool for checking vulnerability of network clients connecting to server provided by this tool<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\">usage: sudo client_vuln_tester.py [-h] [&#8211;server-ip SERVER_IP]<br>                              [&#8211;server-port SERVER_PORT]<br>                              [&#8211;protocol {CoAP,mDNS,MQTT,DTLS,SSDP,HTCPCP}]<br>                              [&#8211;verbose]<br>                              [&#8211;vuln {ALL,BOTAN_000,COAPTHON3_000,\u2026} [{ALL,BOTAN_000,COAPTHON3_000,\u2026} \u2026]]<br>                              [&#8211;cve {ALL,CVE-2017-12087,\u2026} [{ALL,CVE-2017-12087,\u2026} \u2026]]<br>                              [&#8211;list]<br> optional arguments:<br>   -h, &#8211;help            show this help message and exit<br>   &#8211;server-ip SERVER_IP, -SI SERVER_IP<br>                         IP address, that will be used to set up tester server<br>   &#8211;server-port SERVER_PORT, -SP SERVER_PORT<br>                         port that will be used to set up server<br>   &#8211;protocol {CoAP,mDNS,MQTT,DTLS,SSDP,HTCPCP}, -P {CoAP,mDNS,MQTT,DTLS,SSDP,HTCPCP}<br>                         protocol to be tested<br>   &#8211;verbose, -V, &#8211;debug, -D<br>                         Turn on verbose\/debug mode (more messages)<br>   &#8211;vuln {ALL,BOTAN_000,COAPTHON3_000,\u2026} [{ALL,BOTAN_000,COAPTHON3_000,\u2026} \u2026]<br>                         list of vulnerabilities to be tested (by SOFT_NUM id)<br>   &#8211;cve {ALL,CVE-2017-12087,CVE-2017-12130,\u2026} [{ALL,CVE-2017-12087,CVE-2017-12130,\u2026} \u2026]<br>                         list of vulnerabilities to be tested (by CVE id)<br>   &#8211;list, -L            display lists of all vulnerabilities supported by this<br>                         tool with detailed description<\/p>\n\n\n\n<p><strong>cotopaxi.amplifier_detector<\/strong><\/p>\n\n\n\n<p>Tool for detection of network devices amplifying reflected traffic by observing size of incoming and outgoing size of packets<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\">usage: sudo python -m cotopaxi.amplifier_detector [-h] [&#8211;port PORT] [&#8211;nr NR] [&#8211;verbose] dest_ip<br> positional arguments:<br>   dest_ip               destination IP address<br> optional arguments:<br>   -h, &#8211;help            show this help message and exit<br>   &#8211;interval INTERVAL, -I INTERVAL<br>                         minimal interval in sec between displayed status<br>                         messages (default: 1 sec)<br>   &#8211;port PORT, &#8211;dest_port PORT, -P PORT<br>                         destination port<br>   &#8211;nr NR, -N NR        number of packets to be sniffed (default: 9999999)<br>   &#8211;verbose, -V, &#8211;debug, -D<br>                         turn on verbose\/debug mode (more messages)<\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Known issues \/ limitations<\/strong><\/p>\n\n\n\n<p>There are some known issues or limitations caused by using scapy as network library:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>testing services running on the same machine can results in issues occurred by not delivering some packets,<\/li><li>multiple tools running against the same target can result in interference between them (packets may be indicated as a response to another request).<\/li><\/ul>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Unit Tests<\/strong><\/p>\n\n\n\n<p>To run all unit tests use (from directory upper than cotopaxi dir):<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\">sudo python -m unittest discover <\/p>\n\n\n\n<p>Most of tests are performed against remote tests servers and require preparing test environment, providing settings in tests\/test_config.ini and tests\/test_servers.yaml.<\/p>\n\n\n\n<div class=\"wp-block-button aligncenter is-style-squared\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/Samsung\/cotopaxi\"><strong>Download<\/strong><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cotopaxi set of tools for security testing of Internet of Things devices using protocols like: CoAP, DTLS, HTCPCP, mDNS, MQTT, SSDP. Requirements Currently Cotopaxi works only with Python 2.7.x, but future versions will work also with Python 3. If you have previous installation of scapy without scapy-ssl_tls, please remove it or use venv. Installation of [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":15872,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-HYHtVonvisg\/Xax6mZv0tEI\/AAAAAAAADBc\/na_xqbsFqNsd4a-kyEqC_F4GfbKFQM2ugCLcBGAsYHQ\/s1600\/cotopaxi%2B%25281%2529.png","fifu_image_alt":"Cotopaxi : Set Of Tools For Security Testing Of Internet Of Things Devices Using Specific Network IoT Protocols","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[663],"class_list":["post-6977","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-cotopaxi"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cotopaxi : Set Of Tools For Security Testing Of Internet Of Things<\/title>\n<meta name=\"description\" content=\"Cotopaxi set of tools for security testing of Internet of Things devices using protocols like: CoAP, DTLS, HTCPCP, mDNS, MQTT, SSDP.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/cotopaxi\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cotopaxi : Set Of Tools For Security Testing Of Internet Of Things\" \/>\n<meta property=\"og:description\" content=\"Cotopaxi set of tools for security testing of Internet of Things devices using protocols like: CoAP, DTLS, HTCPCP, mDNS, MQTT, SSDP.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/cotopaxi\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-21T11:11:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-HYHtVonvisg\/Xax6mZv0tEI\/AAAAAAAADBc\/na_xqbsFqNsd4a-kyEqC_F4GfbKFQM2ugCLcBGAsYHQ\/s1600\/cotopaxi%2B%25281%2529.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-HYHtVonvisg\/Xax6mZv0tEI\/AAAAAAAADBc\/na_xqbsFqNsd4a-kyEqC_F4GfbKFQM2ugCLcBGAsYHQ\/s1600\/cotopaxi%2B%25281%2529.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/cotopaxi\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/cotopaxi\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Cotopaxi : Set Of Tools For Security Testing Of Internet Of Things Devices Using Specific Network IoT Protocols\",\"datePublished\":\"2019-10-21T11:11:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/cotopaxi\/\"},\"wordCount\":1855,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/cotopaxi\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-HYHtVonvisg\/Xax6mZv0tEI\/AAAAAAAADBc\/na_xqbsFqNsd4a-kyEqC_F4GfbKFQM2ugCLcBGAsYHQ\/s1600\/cotopaxi%2B%25281%2529.png\",\"keywords\":[\"Cotopaxi\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/cotopaxi\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/cotopaxi\/\",\"name\":\"Cotopaxi : Set Of Tools For Security Testing Of Internet Of Things\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/cotopaxi\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/cotopaxi\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-HYHtVonvisg\/Xax6mZv0tEI\/AAAAAAAADBc\/na_xqbsFqNsd4a-kyEqC_F4GfbKFQM2ugCLcBGAsYHQ\/s1600\/cotopaxi%2B%25281%2529.png\",\"datePublished\":\"2019-10-21T11:11:31+00:00\",\"description\":\"Cotopaxi set of tools for security testing of Internet of Things devices using protocols like: CoAP, DTLS, HTCPCP, mDNS, MQTT, SSDP.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/cotopaxi\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/cotopaxi\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-HYHtVonvisg\/Xax6mZv0tEI\/AAAAAAAADBc\/na_xqbsFqNsd4a-kyEqC_F4GfbKFQM2ugCLcBGAsYHQ\/s1600\/cotopaxi%2B%25281%2529.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-HYHtVonvisg\/Xax6mZv0tEI\/AAAAAAAADBc\/na_xqbsFqNsd4a-kyEqC_F4GfbKFQM2ugCLcBGAsYHQ\/s1600\/cotopaxi%2B%25281%2529.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cotopaxi : Set Of Tools For Security Testing Of Internet Of Things","description":"Cotopaxi set of tools for security testing of Internet of Things devices using protocols like: CoAP, DTLS, HTCPCP, mDNS, MQTT, SSDP.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/cotopaxi\/","og_locale":"en_US","og_type":"article","og_title":"Cotopaxi : Set Of Tools For Security Testing Of Internet Of Things","og_description":"Cotopaxi set of tools for security testing of Internet of Things devices using protocols like: CoAP, DTLS, HTCPCP, mDNS, MQTT, SSDP.","og_url":"https:\/\/kalilinuxtutorials.com\/cotopaxi\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2019-10-21T11:11:31+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-HYHtVonvisg\/Xax6mZv0tEI\/AAAAAAAADBc\/na_xqbsFqNsd4a-kyEqC_F4GfbKFQM2ugCLcBGAsYHQ\/s1600\/cotopaxi%2B%25281%2529.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-HYHtVonvisg\/Xax6mZv0tEI\/AAAAAAAADBc\/na_xqbsFqNsd4a-kyEqC_F4GfbKFQM2ugCLcBGAsYHQ\/s1600\/cotopaxi%2B%25281%2529.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/cotopaxi\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/cotopaxi\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Cotopaxi : Set Of Tools For Security Testing Of Internet Of Things Devices Using Specific Network IoT Protocols","datePublished":"2019-10-21T11:11:31+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/cotopaxi\/"},"wordCount":1855,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/cotopaxi\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-HYHtVonvisg\/Xax6mZv0tEI\/AAAAAAAADBc\/na_xqbsFqNsd4a-kyEqC_F4GfbKFQM2ugCLcBGAsYHQ\/s1600\/cotopaxi%2B%25281%2529.png","keywords":["Cotopaxi"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/cotopaxi\/","url":"https:\/\/kalilinuxtutorials.com\/cotopaxi\/","name":"Cotopaxi : Set Of Tools For Security Testing Of Internet Of Things","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/cotopaxi\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/cotopaxi\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-HYHtVonvisg\/Xax6mZv0tEI\/AAAAAAAADBc\/na_xqbsFqNsd4a-kyEqC_F4GfbKFQM2ugCLcBGAsYHQ\/s1600\/cotopaxi%2B%25281%2529.png","datePublished":"2019-10-21T11:11:31+00:00","description":"Cotopaxi set of tools for security testing of Internet of Things devices using protocols like: CoAP, DTLS, HTCPCP, mDNS, MQTT, SSDP.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/cotopaxi\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/cotopaxi\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-HYHtVonvisg\/Xax6mZv0tEI\/AAAAAAAADBc\/na_xqbsFqNsd4a-kyEqC_F4GfbKFQM2ugCLcBGAsYHQ\/s1600\/cotopaxi%2B%25281%2529.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-HYHtVonvisg\/Xax6mZv0tEI\/AAAAAAAADBc\/na_xqbsFqNsd4a-kyEqC_F4GfbKFQM2ugCLcBGAsYHQ\/s1600\/cotopaxi%2B%25281%2529.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-HYHtVonvisg\/Xax6mZv0tEI\/AAAAAAAADBc\/na_xqbsFqNsd4a-kyEqC_F4GfbKFQM2ugCLcBGAsYHQ\/s1600\/cotopaxi%2B%25281%2529.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":5565,"url":"https:\/\/kalilinuxtutorials.com\/scapy-interactive-packet-manipulation\/","url_meta":{"origin":6977,"position":0},"title":"Scapy : Python-Based Interactive Packet Manipulation Program &#038; Library","author":"R K","date":"July 1, 2019","format":false,"excerpt":"Scapy is a powerful Python-based interactive packet manipulation program and library. It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, store or read them using pcap files, match requests and replies, and much more. It is designed to\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":33803,"url":"https:\/\/kalilinuxtutorials.com\/freeway\/","url_meta":{"origin":6977,"position":1},"title":"Freeway &#8211; A Comprehensive Guide To WiFi Penetration Testing With Python","author":"Varshini","date":"July 12, 2024","format":false,"excerpt":"\"Freeway\" is a Python-based tool designed to enhance WiFi penetration testing and network security. Utilizing the capabilities of Scapy, it equips ethical hackers and security professionals with the necessary tools to audit and secure networks. Explore its robust features like packet monitoring, deauthentication attacks, and more to sharpen your cybersecurity\u2026","rel":"","context":"In &quot;Hacking Tools&quot;","block_context":{"text":"Hacking Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/hacking-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjZxzkhHBeEv7MyAEL8lgl_h7_y63oSu8c8oqmQ7QM9inZBf0w4dQhZu-Dv56h7qIo2crbg_7GUPOMvx3Rj4PHlzmnQ2J1RMCT6sY1i_1cYGRVh0Zj69xx2z3VtGAmyZ8AijR3hiv0y1xdtS0eqgoSq-UprkFyh4bWQKtbVVHU9t4iCXijUgNABPQmkVwpe\/s16000\/Freeway%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjZxzkhHBeEv7MyAEL8lgl_h7_y63oSu8c8oqmQ7QM9inZBf0w4dQhZu-Dv56h7qIo2crbg_7GUPOMvx3Rj4PHlzmnQ2J1RMCT6sY1i_1cYGRVh0Zj69xx2z3VtGAmyZ8AijR3hiv0y1xdtS0eqgoSq-UprkFyh4bWQKtbVVHU9t4iCXijUgNABPQmkVwpe\/s16000\/Freeway%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjZxzkhHBeEv7MyAEL8lgl_h7_y63oSu8c8oqmQ7QM9inZBf0w4dQhZu-Dv56h7qIo2crbg_7GUPOMvx3Rj4PHlzmnQ2J1RMCT6sY1i_1cYGRVh0Zj69xx2z3VtGAmyZ8AijR3hiv0y1xdtS0eqgoSq-UprkFyh4bWQKtbVVHU9t4iCXijUgNABPQmkVwpe\/s16000\/Freeway%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjZxzkhHBeEv7MyAEL8lgl_h7_y63oSu8c8oqmQ7QM9inZBf0w4dQhZu-Dv56h7qIo2crbg_7GUPOMvx3Rj4PHlzmnQ2J1RMCT6sY1i_1cYGRVh0Zj69xx2z3VtGAmyZ8AijR3hiv0y1xdtS0eqgoSq-UprkFyh4bWQKtbVVHU9t4iCXijUgNABPQmkVwpe\/s16000\/Freeway%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjZxzkhHBeEv7MyAEL8lgl_h7_y63oSu8c8oqmQ7QM9inZBf0w4dQhZu-Dv56h7qIo2crbg_7GUPOMvx3Rj4PHlzmnQ2J1RMCT6sY1i_1cYGRVh0Zj69xx2z3VtGAmyZ8AijR3hiv0y1xdtS0eqgoSq-UprkFyh4bWQKtbVVHU9t4iCXijUgNABPQmkVwpe\/s16000\/Freeway%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjZxzkhHBeEv7MyAEL8lgl_h7_y63oSu8c8oqmQ7QM9inZBf0w4dQhZu-Dv56h7qIo2crbg_7GUPOMvx3Rj4PHlzmnQ2J1RMCT6sY1i_1cYGRVh0Zj69xx2z3VtGAmyZ8AijR3hiv0y1xdtS0eqgoSq-UprkFyh4bWQKtbVVHU9t4iCXijUgNABPQmkVwpe\/s16000\/Freeway%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":32774,"url":"https:\/\/kalilinuxtutorials.com\/hacking-toolkit\/","url_meta":{"origin":6977,"position":2},"title":"Hacking-Toolkit : The Ultimate Suite For Network Security And Penetration Testing","author":"Varshini","date":"April 16, 2024","format":false,"excerpt":"Developed an integrated suite of network security and penetration testing tools using Python. This toolkit aims to provide cybersecurity professionals and ethical hackers with a comprehensive set of utilities to perform network analysis, security audits, and penetration testing. The tools are designed with an emphasis on simplicity, efficiency, and effectiveness,\u2026","rel":"","context":"In &quot;Hacking Tools&quot;","block_context":{"text":"Hacking Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/hacking-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEglCFaQJ0SzOZi0RygW2vrwbfxBzQCNei2OYI-2st02KY8sC-Kb2d1TKiEVn8N93feOMDBq47sVZ906JIUh6mqArRJFadGMOgqQ1Jlnh60ou77Su6sB7WLY9vgxOuX6n9IZWASDb6O8FeMu4b3HvpwJVIz4RFojkbzJBzIC9ax_lHD-VyRJaRWt1Z1XNDzf\/s16000\/Hacking-Toolkit.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEglCFaQJ0SzOZi0RygW2vrwbfxBzQCNei2OYI-2st02KY8sC-Kb2d1TKiEVn8N93feOMDBq47sVZ906JIUh6mqArRJFadGMOgqQ1Jlnh60ou77Su6sB7WLY9vgxOuX6n9IZWASDb6O8FeMu4b3HvpwJVIz4RFojkbzJBzIC9ax_lHD-VyRJaRWt1Z1XNDzf\/s16000\/Hacking-Toolkit.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEglCFaQJ0SzOZi0RygW2vrwbfxBzQCNei2OYI-2st02KY8sC-Kb2d1TKiEVn8N93feOMDBq47sVZ906JIUh6mqArRJFadGMOgqQ1Jlnh60ou77Su6sB7WLY9vgxOuX6n9IZWASDb6O8FeMu4b3HvpwJVIz4RFojkbzJBzIC9ax_lHD-VyRJaRWt1Z1XNDzf\/s16000\/Hacking-Toolkit.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEglCFaQJ0SzOZi0RygW2vrwbfxBzQCNei2OYI-2st02KY8sC-Kb2d1TKiEVn8N93feOMDBq47sVZ906JIUh6mqArRJFadGMOgqQ1Jlnh60ou77Su6sB7WLY9vgxOuX6n9IZWASDb6O8FeMu4b3HvpwJVIz4RFojkbzJBzIC9ax_lHD-VyRJaRWt1Z1XNDzf\/s16000\/Hacking-Toolkit.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEglCFaQJ0SzOZi0RygW2vrwbfxBzQCNei2OYI-2st02KY8sC-Kb2d1TKiEVn8N93feOMDBq47sVZ906JIUh6mqArRJFadGMOgqQ1Jlnh60ou77Su6sB7WLY9vgxOuX6n9IZWASDb6O8FeMu4b3HvpwJVIz4RFojkbzJBzIC9ax_lHD-VyRJaRWt1Z1XNDzf\/s16000\/Hacking-Toolkit.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEglCFaQJ0SzOZi0RygW2vrwbfxBzQCNei2OYI-2st02KY8sC-Kb2d1TKiEVn8N93feOMDBq47sVZ906JIUh6mqArRJFadGMOgqQ1Jlnh60ou77Su6sB7WLY9vgxOuX6n9IZWASDb6O8FeMu4b3HvpwJVIz4RFojkbzJBzIC9ax_lHD-VyRJaRWt1Z1XNDzf\/s16000\/Hacking-Toolkit.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":3578,"url":"https:\/\/kalilinuxtutorials.com\/malcom-malware-communications-analyzer\/","url_meta":{"origin":6977,"position":3},"title":"Malcom &#8211; Malware Communications Analyzer 2019","author":"R K","date":"January 17, 2019","format":false,"excerpt":"Malcom is a tool designed to analyze a system's network communication using graphical representations of network traffic, and cross-reference them with known malware sources. This comes handy when analyzing how certain malware species try to communicate with the outside world. This tool can help you for the following; detect central\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":7005,"url":"https:\/\/kalilinuxtutorials.com\/foca-metadata-hidden-documents\/","url_meta":{"origin":6977,"position":4},"title":"FOCA : Tool To Find Metadata &#038; Hidden Information In The Documents","author":"R K","date":"October 24, 2019","format":false,"excerpt":"FOCA is a tool used mainly to find metadata and hidden information in the documents it scans. These documents may be on web pages, and can be downloaded and analysed with FOCA. It is capable of analysing a wide variety of documents, with the most common being\u00a0Microsoft Office,\u00a0Open Office, or\u00a0PDF\u00a0files,\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":33163,"url":"https:\/\/kalilinuxtutorials.com\/pelicam\/","url_meta":{"origin":6977,"position":5},"title":"Pelicam &#8211; Enhancing Network Security through IP Camera Vulnerability Detection","author":"Varshini","date":"May 22, 2024","format":false,"excerpt":"Pelicam is an open-source project developed to improve local network security by identifying and raising awareness of IP camera vulnerabilities. It is designed for security researchers, cybersecurity professionals and technology enthusiasts who want to understand and mitigate the risks associated with these connected devices. Our aim is for the project\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjiPEPZ2Z17DKQU-e5oXmAE390p64IXkZ6sYUe0_zMdZ21MahLpHHXGLVQK7NzP8B5q8byT74h2_VSrmmMToVvqIN5xAZGKwvO_IQ4pkvxRr_ZFKYPmJGnhinTF0GGVUPvWO8mmdZPwLwTafa4-sQGUIHiwA46_t72226hOofDFTv_h6eCTDHX5_rN3wzEX\/s16000\/Pelicam%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjiPEPZ2Z17DKQU-e5oXmAE390p64IXkZ6sYUe0_zMdZ21MahLpHHXGLVQK7NzP8B5q8byT74h2_VSrmmMToVvqIN5xAZGKwvO_IQ4pkvxRr_ZFKYPmJGnhinTF0GGVUPvWO8mmdZPwLwTafa4-sQGUIHiwA46_t72226hOofDFTv_h6eCTDHX5_rN3wzEX\/s16000\/Pelicam%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjiPEPZ2Z17DKQU-e5oXmAE390p64IXkZ6sYUe0_zMdZ21MahLpHHXGLVQK7NzP8B5q8byT74h2_VSrmmMToVvqIN5xAZGKwvO_IQ4pkvxRr_ZFKYPmJGnhinTF0GGVUPvWO8mmdZPwLwTafa4-sQGUIHiwA46_t72226hOofDFTv_h6eCTDHX5_rN3wzEX\/s16000\/Pelicam%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjiPEPZ2Z17DKQU-e5oXmAE390p64IXkZ6sYUe0_zMdZ21MahLpHHXGLVQK7NzP8B5q8byT74h2_VSrmmMToVvqIN5xAZGKwvO_IQ4pkvxRr_ZFKYPmJGnhinTF0GGVUPvWO8mmdZPwLwTafa4-sQGUIHiwA46_t72226hOofDFTv_h6eCTDHX5_rN3wzEX\/s16000\/Pelicam%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjiPEPZ2Z17DKQU-e5oXmAE390p64IXkZ6sYUe0_zMdZ21MahLpHHXGLVQK7NzP8B5q8byT74h2_VSrmmMToVvqIN5xAZGKwvO_IQ4pkvxRr_ZFKYPmJGnhinTF0GGVUPvWO8mmdZPwLwTafa4-sQGUIHiwA46_t72226hOofDFTv_h6eCTDHX5_rN3wzEX\/s16000\/Pelicam%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjiPEPZ2Z17DKQU-e5oXmAE390p64IXkZ6sYUe0_zMdZ21MahLpHHXGLVQK7NzP8B5q8byT74h2_VSrmmMToVvqIN5xAZGKwvO_IQ4pkvxRr_ZFKYPmJGnhinTF0GGVUPvWO8mmdZPwLwTafa4-sQGUIHiwA46_t72226hOofDFTv_h6eCTDHX5_rN3wzEX\/s16000\/Pelicam%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/6977","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=6977"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/6977\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/15872"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=6977"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=6977"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=6977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}