-
Notifications
You must be signed in to change notification settings - Fork 1
Expand file tree
/
Copy pathindex.html
More file actions
50 lines (36 loc) · 2.73 KB
/
index.html
File metadata and controls
50 lines (36 loc) · 2.73 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
<!DOCTYPE html>
<html>
<head>
<meta charset='utf-8'>
<meta http-equiv="X-UA-Compatible" content="chrome=1">
<link rel="stylesheet" type="text/css" href="stylesheets/stylesheet.css" media="screen">
<link rel="stylesheet" type="text/css" href="stylesheets/github-dark.css" media="screen">
<link rel="stylesheet" type="text/css" href="stylesheets/print.css" media="print">
<title>Insecurity of Things by insecurityofthings</title>
</head>
<body>
<header>
<div class="container">
<h1>Insecurity of Things</h1>
<h2>You bought it we break it</h2>
<section id="downloads">
<a href="https://github.com/insecurityofthings" class="btn btn-github"><span class="icon"></span>View on GitHub</a>
</section>
</div>
</header>
<div class="container">
<section id="main_content">
<h3>
<a id="welcome-to-insecurity-of-things" class="anchor" href="#welcome-to-insecurity-of-things" aria-hidden="true"><span aria-hidden="true" class="octicon octicon-link"></span></a>Welcome to Insecurity of Things</h3>
<p>Creating POC for IoT devices to promote increased IoT security. Often it is necessary to demonstrate risk in order to create action. Unfortunately, these kinds of issues don't show up on Nessus scans, so we write exploits. Please use this code responsibly.</p>
<h2>
<a id="projects" class="anchor" href="#projects" aria-hidden="true"><span aria-hidden="true" class="octicon octicon-link"></span></a>Projects</h2>
<p><a href="https://github.com/insecurityofthings/jackit">JackIt</a> -- MouseJack POC</p>
<p><em>This is a partial implementation of Bastille's MouseJack exploit. See <a href="https://www.mousejack.com">mousejack.com</a> for more details. Full credit goes to <a href="https://www.bastille.net/meet-mousejack-researchers">Bastille's team</a> for discovering this issue and writing the libraries to work with the CrazyRadio PA dongle. Also, thanks to Samy Kamkar for <a href="http://samy.pl/keysweeper/">KeySweeper</a>, to Thorsten Schroeder and Max Moser for their work on <a href="http://www.remote-exploit.org/articles/keykeriki_v2_0__8211_2_4ghz/">KeyKeriki</a> and to <a href="http://travisgoodspeed.blogspot.ca/2011/02/promiscuity-is-nrf24l01s-duty.html">Travis Goodspeed</a>. We stand on the shoulders of giants.</em></p>
<h2>
<a id="who" class="anchor" href="#who" aria-hidden="true"><span aria-hidden="true" class="octicon octicon-link"></span></a>Who</h2>
<p>We work in the security industry and often it is necessary to demonstrate risk in order to create action. These implementations where written by <a href="https://github.com/phikshun">phikshun</a> and <a href="https://github.com/infamy">infamy</a>.</p>
</section>
</div>
</body>
</html>