HardBreak
GitHubDiscordLinkedInX
  • HardBreak - Hardware Hacking Wiki
  • Introduction
    • How to start
    • Methodology
    • Case Study (Led to a CVE Update)
      • General Case Study
  • Hardware Hacking
    • Introduction
    • Basics
      • Tools
        • Hardware Tools
          • Essential Tools
          • Soldering Tools
          • Logic Analyzer
            • Saleae Logic Analyzer
          • Open-Source Tools
            • Bus Pirate v3.6
            • Bus Pirate 5
            • GoodFET
          • Multimeters & Oscilloscopes
          • JTAG and SWD Debuggers
            • Segger JLink
            • TI CC-Debugger
          • UART-to-TTL adapter
          • Chip readers and programmers
            • Xgecu T56
        • Software Tools
          • Binwalk
          • Firmwalker
          • flashrom
          • Ghidra
          • OpenOCD
          • Mitmrouter
      • Common Hardware Components
      • Firmware Extraction Methods
      • Ethics
    • Reconnaissance
      • Closed device
        • OSINT (search the web)
        • USB Ports / SD-card
      • Opened device
        • Board Analysis
    • Interface Interaction
      • UART
        • Identify UART
        • Connect to UART
        • Extract Firmware using UART
      • I2C
      • SPI
        • Extract Firmware using SPI
      • JTAG/SWD
        • JTAG
          • Identify JTAG
        • SWD
        • Extract Firmware using JTAG/SWD
      • VE.Direct
    • Bypassing Security
      • Voltage Glitching
        • Example: LPC1768
      • Electromagnetic Fault Injection
    • Analyze Firmware
  • Network Analysis
    • Introduction
    • Reconnaissance
    • Protocols
      • WIFI
        • WEP
        • Deauthentication Attacks
      • Application Layer
        • Proprietary Protocols
          • Parrot Anafi Drone Reverse Engineering
        • MQTT
        • CoAP
        • Web Sockets
  • Radio Hacking
    • Introduction
    • Reconnaissance
    • Protocols
      • NFC
      • RFID
    • Tools
      • RF Signal Analyzers
        • RTL-SDR
        • HackRF
      • Flipper Zero
        • NFC
        • Sub-GHz
  • Contribute
    • How to contribute
    • Gitbook - Basics
      • Markdown
      • Images & media
      • Interactive blocks
  • About
    • Impressum – Legal Notice
    • Privacy Policy
    • Datenschutzerklärung
    • License
Powered by GitBook
On this page
  • 1. Documentation
  • 2. Firmware Updates
  • 3. Default Credentials
  • 4. Lookout for CVEs and blogs
  • 5. FCC ID

Was this helpful?

Edit on GitHub
  1. Hardware Hacking
  2. Reconnaissance
  3. Closed device

OSINT (search the web)

PreviousClosed deviceNextUSB Ports / SD-card

Last updated 7 months ago

Was this helpful?

OSINT (Open Source Intelligence) is the practice of collecting information from publicly available resources. In the context of IoT (Internet of Things) devices, this refers to gathering intelligence from a variety of sources to understand the ecosystem, identify potential vulnerabilities, or profile devices connected to networks. OSINT for a device is often overlooked. What to look for:

1. Documentation

  • Manufacturers release documentation detailing device functionalities.

  • Key actions include Backup, USB Port usage, and Firmware Updates.

2. Firmware Updates

  • Public firmware may be available on manufacturers' websites.

  • Allows for reverse engineering without dumping firmware directly from the device.

3. Default Credentials

  • Devices often come with default credentials that are easily exploitable, check websites for them

4. Lookout for CVEs and blogs

  • Community forums may reveal unreported vulnerabilities.

  • Security research papers can highlight known exploits and weaknesses.

5. FCC ID

  • If your device can transmit data over radio frequencies and is sold in the USA, it requires an FCC ID

  • Often you can find it somewhere on the device label:

  • Here an example, where we can already spot a potential debug interface:

A great database of default passwords can be found on

Search on for your target or vendor

On you can search the FCC ID and will get documentation, external photos and very interesting for us: Internal photos

Github
CVEdetails
https://fccid.io/
Search for user manuals or documentation of your target
Example: Netgear offers free firmware downloads
FCC ID found
Internal Photos of target device
Potential UART found on FCC picture