Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

What is HomePwn?

2025-01-16 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)05/31 Report--

This article is to share with you about what HomePwn is. The editor thinks it is very practical, so share it with you as a reference and follow the editor to have a look.

HomePwn

HomePwn is a powerful Internet of things penetration testing framework, it can be said to be a "Swiss Army knife" in this field. HomePwn can provide device security audit and penetration testing functions, and corporate employees can use HomePwn to test the security of home or office devices in the same work environment, and take advantage of security vulnerabilities to read sensitive information in these devices or send control commands to these devices. The tool integrates very powerful module libraries that researchers can use to load more new features and use them in a variety of different types of devices.

HomePwn is developed with a modular architecture, and any user can use different technologies to expand the knowledge base of HomePwn. HomePwn consists of the following two parts:

Scanning module

These modules are used to provide functions related to device and vulnerability scanning and discovery. For example, they can be used to perform WiFi scanning, BLE device discovery, Bluetooth low-power device detection, and check the connection status of target devices in monitoring mode. In addition, it can use SSDP, MDNS, or multicast DNS to scan and discover home or office Internet of things services.

Special module

This module is mainly aimed at the technologies that need to be audited. HomePwn can conduct security audits and penetration tests for technologies such as WiFi, NFC, or BLE. In other words, these technologies will involve a variety of functional modules, and the use of these modules is also very diversified, and these technologies will produce a variety of security problems and loopholes after they are applied to the Internet of things. Therefore, these modules can evaluate and design the security level of these technologies in Internet of things communication devices.

Dependent component

1. Python environment

2. Python command line tool

Tool use

The vast majority of researchers need to copy this project to a local device and then deploy it before they can use the HomePwn ecosystem. First, we need to complete the configuration of the tool dependent environment.

HomePwn is currently only supported on the Linux platform, and python 3.6 needs to be installed and configured:

1. Ubuntu, Debian or Unix-like platform

2. Python 3.6 +

Take Ubuntu 18.04 as an example, first run the following command to update the operating system:

Sudo apt-get update

Run the following command to clone the HomePwn project locally:

Git clone https://github.com/ElevenPaths/HomePWN.git

Next, change to the project directory and run the installation script install.sh:

Cd [path to the HomePWN project] sudo. / install.sh

After the basic run, the user is asked if he needs to create a virtualenv virtual environment, and if "y" is entered, the script automatically installs the Python dependent library in the virtualenv environment.

Tool use

If you use HomePwn in a virtual environment, you also need to activate the environment:

Source homePwn/bin/activate

Next, run the HomePwn script:

Sudo python3 homePwn.py, thank you for your reading! This is the end of this article on "what is HomePwn?". I hope the above content can be of some help to you, so that you can learn more knowledge. if you think the article is good, you can share it for more people to see!

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report