{"id":9477,"date":"2020-03-03T12:49:57","date_gmt":"2020-03-03T07:19:57","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=9477"},"modified":"2020-03-03T12:49:57","modified_gmt":"2020-03-03T07:19:57","slug":"iotgoat","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/iotgoat\/","title":{"rendered":"IoTGoat : A Deliberately Insecure Firmware Based On OpenWrt"},"content":{"rendered":"\n<p>The <strong>IoTGoat<\/strong> Project is a deliberately insecure firmware based on  OpenWrt. The project\u2019s goal is to teach users about the most common  vulnerabilities typically found in IoT devices. <\/p>\n\n\n\n<p>The vulnerabilities will  be based on the IoT Top 10 as documented by OWASP: <a href=\"https:\/\/www.owasp.org\/index.php\/OWASP_Internet_of_Things_Project\">https:\/\/www.owasp.org\/index.php\/OWASP_Internet_of_Things_Project<\/a>. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-UWi1tO1RibM\/Xls8HKnEIeI\/AAAAAAAAFNs\/yl28XIuj1XYwQaUOUA66SLiYnCe1n_LFgCLcBGAsYHQ\/s1600\/IoTGoat-1.jpg\" alt=\"\"\/><\/figure>\n\n\n\n<p>To get started with developing IoTGoat challenges, review the <a href=\"https:\/\/github.com\/scriptingxss\/IoTGoat\/blob\/master\/BuildEnvironment.md\">Build Environment Guidance<\/a> page. Precompiled firmware and an OVA with the latest build can be found via <a href=\"https:\/\/github.com\/scriptingxss\/IoTGoat\/tree\/master\/build_environment\">https:\/\/github.com\/scriptingxss\/IoTGoat\/tree\/master\/build_environment<\/a>. <\/p>\n\n\n\n<p>If a crucial challenge idea is missing, please reach out to the project leaders below  or add details to the <a href=\"https:\/\/docs.google.com\/spreadsheets\/d\/1KXX2K7ikkve6wmdfAVu-sZONgKEBuAkRij_paJUgX2w\/edit?usp=sharing\">project task page<\/a>. Be sure to join the <a href=\"https:\/\/join.slack.com\/t\/owasp\/shared_invite\/enQtNjExMTc3MTg0MzU4LWQ2Nzg3NGJiZGQ2MjRmNzkzN2Q4YzU1MWYyZTdjYjA2ZTA5M2RkNzE2ZjdkNzI5ZThhOWY5MjljYWZmYmY4ZjM\">OWASP Slack team<\/a>, then join the <strong>#iot-security<\/strong> for news on upcoming project meetings and updates.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Also Read &#8211; <a href=\"https:\/\/kalilinuxtutorials.com\/progress-burp\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Progress Burp : Burp Suite Extension To Track Vulnerability Assessment Progress (opens in a new tab)\">Progress Burp : Burp Suite Extension To Track Vulnerability Assessment Progress<\/a><\/strong><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/scriptingxss\/IoTGoat#project-leaders\"><\/a><\/h4>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Project leaders<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Aaron Guzman (@scriptingxss)<\/li><li>Fotios Chantzis<\/li><li>Paulino Calderon<\/li><\/ul>\n\n\n\n<div class=\"wp-block-button aligncenter is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/scriptingxss\/IoTGoat\"><strong>Download<\/strong><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The IoTGoat Project is a deliberately insecure firmware based on OpenWrt. The project\u2019s goal is to teach users about the most common vulnerabilities typically found in IoT devices. The vulnerabilities will be based on the IoT Top 10 as documented by OWASP: https:\/\/www.owasp.org\/index.php\/OWASP_Internet_of_Things_Project. To get started with developing IoTGoat challenges, review the Build Environment Guidance [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":16145,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-UMIrTNxLQb8\/Xls8AlEmJsI\/AAAAAAAAFNo\/FtCHq9DRbbIJEEfdRAn1vuq_ZgCSQEcUgCLcBGAsYHQ\/s1600\/IoTGoat%25281%2529.png","fifu_image_alt":"IoTGoat : A Deliberately Insecure Firmware Based On OpenWrt","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[1213,1669,1672,2342],"class_list":["post-9477","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-firmware","tag-iot","tag-iotgoat","tag-openwrt"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IoTGoat : A Deliberately Insecure Firmware Based On OpenWrt<\/title>\n<meta name=\"description\" content=\"The IoTGoat Project is a deliberately insecure firmware based on OpenWrt. The project\u2019s goal is to teach users about the most common vulnerabilities\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/iotgoat\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IoTGoat : A Deliberately Insecure Firmware Based On OpenWrt\" \/>\n<meta property=\"og:description\" content=\"The IoTGoat Project is a deliberately insecure firmware based on OpenWrt. The project\u2019s goal is to teach users about the most common vulnerabilities\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/iotgoat\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-03T07:19:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-UMIrTNxLQb8\/Xls8AlEmJsI\/AAAAAAAAFNo\/FtCHq9DRbbIJEEfdRAn1vuq_ZgCSQEcUgCLcBGAsYHQ\/s1600\/IoTGoat%25281%2529.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-UMIrTNxLQb8\/Xls8AlEmJsI\/AAAAAAAAFNo\/FtCHq9DRbbIJEEfdRAn1vuq_ZgCSQEcUgCLcBGAsYHQ\/s1600\/IoTGoat%25281%2529.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/iotgoat\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/iotgoat\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"IoTGoat : A Deliberately Insecure Firmware Based On OpenWrt\",\"datePublished\":\"2020-03-03T07:19:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/iotgoat\/\"},\"wordCount\":162,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/iotgoat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-UMIrTNxLQb8\/Xls8AlEmJsI\/AAAAAAAAFNo\/FtCHq9DRbbIJEEfdRAn1vuq_ZgCSQEcUgCLcBGAsYHQ\/s1600\/IoTGoat%25281%2529.png\",\"keywords\":[\"Firmware\",\"IoT\",\"IoTGoat\",\"OpenWrt\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/iotgoat\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/iotgoat\/\",\"name\":\"IoTGoat : A Deliberately Insecure Firmware Based On OpenWrt\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/iotgoat\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/iotgoat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-UMIrTNxLQb8\/Xls8AlEmJsI\/AAAAAAAAFNo\/FtCHq9DRbbIJEEfdRAn1vuq_ZgCSQEcUgCLcBGAsYHQ\/s1600\/IoTGoat%25281%2529.png\",\"datePublished\":\"2020-03-03T07:19:57+00:00\",\"description\":\"The IoTGoat Project is a deliberately insecure firmware based on OpenWrt. The project\u2019s goal is to teach users about the most common vulnerabilities\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/iotgoat\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/iotgoat\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-UMIrTNxLQb8\/Xls8AlEmJsI\/AAAAAAAAFNo\/FtCHq9DRbbIJEEfdRAn1vuq_ZgCSQEcUgCLcBGAsYHQ\/s1600\/IoTGoat%25281%2529.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-UMIrTNxLQb8\/Xls8AlEmJsI\/AAAAAAAAFNo\/FtCHq9DRbbIJEEfdRAn1vuq_ZgCSQEcUgCLcBGAsYHQ\/s1600\/IoTGoat%25281%2529.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IoTGoat : A Deliberately Insecure Firmware Based On OpenWrt","description":"The IoTGoat Project is a deliberately insecure firmware based on OpenWrt. The project\u2019s goal is to teach users about the most common vulnerabilities","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/iotgoat\/","og_locale":"en_US","og_type":"article","og_title":"IoTGoat : A Deliberately Insecure Firmware Based On OpenWrt","og_description":"The IoTGoat Project is a deliberately insecure firmware based on OpenWrt. The project\u2019s goal is to teach users about the most common vulnerabilities","og_url":"https:\/\/kalilinuxtutorials.com\/iotgoat\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2020-03-03T07:19:57+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-UMIrTNxLQb8\/Xls8AlEmJsI\/AAAAAAAAFNo\/FtCHq9DRbbIJEEfdRAn1vuq_ZgCSQEcUgCLcBGAsYHQ\/s1600\/IoTGoat%25281%2529.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-UMIrTNxLQb8\/Xls8AlEmJsI\/AAAAAAAAFNo\/FtCHq9DRbbIJEEfdRAn1vuq_ZgCSQEcUgCLcBGAsYHQ\/s1600\/IoTGoat%25281%2529.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/iotgoat\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/iotgoat\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"IoTGoat : A Deliberately Insecure Firmware Based On OpenWrt","datePublished":"2020-03-03T07:19:57+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/iotgoat\/"},"wordCount":162,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/iotgoat\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-UMIrTNxLQb8\/Xls8AlEmJsI\/AAAAAAAAFNo\/FtCHq9DRbbIJEEfdRAn1vuq_ZgCSQEcUgCLcBGAsYHQ\/s1600\/IoTGoat%25281%2529.png","keywords":["Firmware","IoT","IoTGoat","OpenWrt"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/iotgoat\/","url":"https:\/\/kalilinuxtutorials.com\/iotgoat\/","name":"IoTGoat : A Deliberately Insecure Firmware Based On OpenWrt","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/iotgoat\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/iotgoat\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-UMIrTNxLQb8\/Xls8AlEmJsI\/AAAAAAAAFNo\/FtCHq9DRbbIJEEfdRAn1vuq_ZgCSQEcUgCLcBGAsYHQ\/s1600\/IoTGoat%25281%2529.png","datePublished":"2020-03-03T07:19:57+00:00","description":"The IoTGoat Project is a deliberately insecure firmware based on OpenWrt. The project\u2019s goal is to teach users about the most common vulnerabilities","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/iotgoat\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/iotgoat\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-UMIrTNxLQb8\/Xls8AlEmJsI\/AAAAAAAAFNo\/FtCHq9DRbbIJEEfdRAn1vuq_ZgCSQEcUgCLcBGAsYHQ\/s1600\/IoTGoat%25281%2529.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-UMIrTNxLQb8\/Xls8AlEmJsI\/AAAAAAAAFNo\/FtCHq9DRbbIJEEfdRAn1vuq_ZgCSQEcUgCLcBGAsYHQ\/s1600\/IoTGoat%25281%2529.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-UMIrTNxLQb8\/Xls8AlEmJsI\/AAAAAAAAFNo\/FtCHq9DRbbIJEEfdRAn1vuq_ZgCSQEcUgCLcBGAsYHQ\/s1600\/IoTGoat%25281%2529.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":32450,"url":"https:\/\/kalilinuxtutorials.com\/awesome-embedded-and-iot-security\/","url_meta":{"origin":9477,"position":0},"title":"Awesome Embedded And IoT Security &#8211; Key Tools And Insights","author":"Varshini","date":"March 25, 2024","format":false,"excerpt":"Botnets like\u00a0Mirai\u00a0have proven that there is a need for more security in embedded and IoT devices. This list shall help beginners and experts to find helpful resources on the topic. If you are a beginner, you should have a look at the\u00a0Books\u00a0and\u00a0Case Studies\u00a0sections. If you want to start right away\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhAeAS8alb4haQnVHHUi3eLpwxJKGUsTABOdmqCgXe0zrx66fWXpKrVLK9DOWbjXT8Rb-r68jJi1MvUlm8Stz0mvvc2-DSFOL8Luo6xgaydPonkZFaCn9HY6n6Jo_qsAUn9fGO00txWPIk1qYsZEzweD7zEMKjqUtM1jiDpQphHmpmUblsAmuYrGEODJW4f\/s16000\/Critical%20Atlassian%20Flaw%20%286%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhAeAS8alb4haQnVHHUi3eLpwxJKGUsTABOdmqCgXe0zrx66fWXpKrVLK9DOWbjXT8Rb-r68jJi1MvUlm8Stz0mvvc2-DSFOL8Luo6xgaydPonkZFaCn9HY6n6Jo_qsAUn9fGO00txWPIk1qYsZEzweD7zEMKjqUtM1jiDpQphHmpmUblsAmuYrGEODJW4f\/s16000\/Critical%20Atlassian%20Flaw%20%286%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhAeAS8alb4haQnVHHUi3eLpwxJKGUsTABOdmqCgXe0zrx66fWXpKrVLK9DOWbjXT8Rb-r68jJi1MvUlm8Stz0mvvc2-DSFOL8Luo6xgaydPonkZFaCn9HY6n6Jo_qsAUn9fGO00txWPIk1qYsZEzweD7zEMKjqUtM1jiDpQphHmpmUblsAmuYrGEODJW4f\/s16000\/Critical%20Atlassian%20Flaw%20%286%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhAeAS8alb4haQnVHHUi3eLpwxJKGUsTABOdmqCgXe0zrx66fWXpKrVLK9DOWbjXT8Rb-r68jJi1MvUlm8Stz0mvvc2-DSFOL8Luo6xgaydPonkZFaCn9HY6n6Jo_qsAUn9fGO00txWPIk1qYsZEzweD7zEMKjqUtM1jiDpQphHmpmUblsAmuYrGEODJW4f\/s16000\/Critical%20Atlassian%20Flaw%20%286%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhAeAS8alb4haQnVHHUi3eLpwxJKGUsTABOdmqCgXe0zrx66fWXpKrVLK9DOWbjXT8Rb-r68jJi1MvUlm8Stz0mvvc2-DSFOL8Luo6xgaydPonkZFaCn9HY6n6Jo_qsAUn9fGO00txWPIk1qYsZEzweD7zEMKjqUtM1jiDpQphHmpmUblsAmuYrGEODJW4f\/s16000\/Critical%20Atlassian%20Flaw%20%286%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhAeAS8alb4haQnVHHUi3eLpwxJKGUsTABOdmqCgXe0zrx66fWXpKrVLK9DOWbjXT8Rb-r68jJi1MvUlm8Stz0mvvc2-DSFOL8Luo6xgaydPonkZFaCn9HY6n6Jo_qsAUn9fGO00txWPIk1qYsZEzweD7zEMKjqUtM1jiDpQphHmpmUblsAmuYrGEODJW4f\/s16000\/Critical%20Atlassian%20Flaw%20%286%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":7001,"url":"https:\/\/kalilinuxtutorials.com\/iot-implant-toolkit-for-implant-attack\/","url_meta":{"origin":9477,"position":1},"title":"IoT Implant : Toolkit For Implant Attack Of IoT Devices","author":"R K","date":"October 24, 2019","format":false,"excerpt":"IoT Implant Toolkit is a framework of useful tools for malware implantation research of IoT devices. It is a toolkit consisted of essential software tools on firmware modification, serial port debugging, software analysis and stable spy clients. With an easy-to-use and extensible shell-like environment, IoT-Implant-Toolkit is a one-stop-shop toolkit simplifies\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":8317,"url":"https:\/\/kalilinuxtutorials.com\/karonte-detect-vulnerabilities-embedded-firmware\/","url_meta":{"origin":9477,"position":2},"title":"Karonte : Static Analysis Tool To Detect Multi-Binary Vulnerabilities In Embedded Firmware","author":"R K","date":"January 13, 2020","format":false,"excerpt":"Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware. Research Paper We present our approach and the findings of this work in the following research paper: Detecting Insecure Multi-binary Interactions in Embedded Firmware [PDF] Nilo Redini, Aravind Machiry, Ruoyu Wang, Chad Spensky, Andrea Continella, Yan Shoshitaishvili,\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":6682,"url":"https:\/\/kalilinuxtutorials.com\/firmware-analysis-toolkit\/","url_meta":{"origin":9477,"position":3},"title":"Firmware Analysis Toolkit : To Emulate Firmware And Analyse It For Security Vulnerabilities","author":"R K","date":"September 30, 2019","format":false,"excerpt":"Firmware analysis toolkit is a toolkit to emulate firmware and analyse it for security vulnerabilities. FAT is a toolkit built in order to help security researchers analyze and identify vulnerabilities in IoT and embedded device firmware. Firmware Analysis Toolkit is build on top of the following existing tools and projects\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":37116,"url":"https:\/\/kalilinuxtutorials.com\/binwalk\/","url_meta":{"origin":9477,"position":4},"title":"Binwalk : A Comprehensive Firmware Analysis Tool","author":"Varshini","date":"March 18, 2025","format":false,"excerpt":"Binwalk is a powerful tool designed for analyzing and extracting embedded files from firmware images. It is widely used by security researchers and penetration testers for identifying vulnerabilities in IoT devices and other hardware. Binwalk's capabilities have been enhanced with the release of Binwalk v3, which is rewritten in Rust\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Binwalk-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Binwalk-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Binwalk-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Binwalk-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Binwalk-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Binwalk-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":30114,"url":"https:\/\/kalilinuxtutorials.com\/catsniffer\/","url_meta":{"origin":9477,"position":5},"title":"CatSniffer &#8211; The Ultimate Multiprotocol IoT Attack Tool in USB Form","author":"Varshini","date":"September 8, 2023","format":false,"excerpt":"CatSniffer is an original multiprotocol, and multiband board made for sniffing, communicating, and attacking IoT (Internet of Things) devices. It was designed as a highly portable USB stick that integrates the new chips TI CC1352, Semtech SX1262, Microchip SAMD21E17 V2 or previous, and RP2040 V3 or later. This board is\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgTeVd2oxs4NZ7RG8OsaIZ-Ls5nFaQH7YLhMCS8Xt2IACN2AalYXqsr5lHl0Q0mATXtOKc0odZivROCmOtRy25uvPMN241EZya8G6_244-5Z9G61XpWkvHLZE94S1HxBr1mYUniBfdmhAMFy541639zreuVUI5OR7LhygkqQrn4os2V83aB-mfWt3Qohw\/s16000\/Catsniffer.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgTeVd2oxs4NZ7RG8OsaIZ-Ls5nFaQH7YLhMCS8Xt2IACN2AalYXqsr5lHl0Q0mATXtOKc0odZivROCmOtRy25uvPMN241EZya8G6_244-5Z9G61XpWkvHLZE94S1HxBr1mYUniBfdmhAMFy541639zreuVUI5OR7LhygkqQrn4os2V83aB-mfWt3Qohw\/s16000\/Catsniffer.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgTeVd2oxs4NZ7RG8OsaIZ-Ls5nFaQH7YLhMCS8Xt2IACN2AalYXqsr5lHl0Q0mATXtOKc0odZivROCmOtRy25uvPMN241EZya8G6_244-5Z9G61XpWkvHLZE94S1HxBr1mYUniBfdmhAMFy541639zreuVUI5OR7LhygkqQrn4os2V83aB-mfWt3Qohw\/s16000\/Catsniffer.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgTeVd2oxs4NZ7RG8OsaIZ-Ls5nFaQH7YLhMCS8Xt2IACN2AalYXqsr5lHl0Q0mATXtOKc0odZivROCmOtRy25uvPMN241EZya8G6_244-5Z9G61XpWkvHLZE94S1HxBr1mYUniBfdmhAMFy541639zreuVUI5OR7LhygkqQrn4os2V83aB-mfWt3Qohw\/s16000\/Catsniffer.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgTeVd2oxs4NZ7RG8OsaIZ-Ls5nFaQH7YLhMCS8Xt2IACN2AalYXqsr5lHl0Q0mATXtOKc0odZivROCmOtRy25uvPMN241EZya8G6_244-5Z9G61XpWkvHLZE94S1HxBr1mYUniBfdmhAMFy541639zreuVUI5OR7LhygkqQrn4os2V83aB-mfWt3Qohw\/s16000\/Catsniffer.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgTeVd2oxs4NZ7RG8OsaIZ-Ls5nFaQH7YLhMCS8Xt2IACN2AalYXqsr5lHl0Q0mATXtOKc0odZivROCmOtRy25uvPMN241EZya8G6_244-5Z9G61XpWkvHLZE94S1HxBr1mYUniBfdmhAMFy541639zreuVUI5OR7LhygkqQrn4os2V83aB-mfWt3Qohw\/s16000\/Catsniffer.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/9477","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=9477"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/9477\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/16145"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=9477"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=9477"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=9477"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}