IoTHackBot automates vulnerability discovery in IoT devices, IP cameras, and embedded systems. Security teams use it to identify and mitigate risks in hybrid IoT environments. It integrates with Claude Code skills and Python-based tools for comprehensive security testing.
git clone https://github.com/BrownFineSecurity/iothackbot.gitThe iothackbot is a specialized Claude Code skill designed to streamline hybrid IoT penetration testing. This skill provides a comprehensive suite of tools and capabilities for automating the discovery of ONVIF devices on a network, enabling users to identify potential security risks efficiently. By leveraging advanced techniques such as authentication bypass testing and credential brute-forcing, iothackbot empowers security professionals to uncover vulnerabilities in IoT devices quickly and effectively. One of the key benefits of using iothackbot is the significant time savings it offers in the realm of IoT security assessments. With an estimated implementation time of just 30 minutes, users can rapidly deploy this skill and begin automating complex tasks such as analyzing network traffic for IoT protocols and extracting firmware from devices. This not only accelerates the testing process but also enhances the overall effectiveness of security measures by allowing for real-time vulnerability detection. Developers, product managers, and AI practitioners involved in IoT security will find iothackbot particularly beneficial. Its intermediate complexity level makes it accessible for those with a foundational understanding of IoT systems and security testing. The skill is designed to fit seamlessly into AI-first workflows, enabling teams to integrate automation into their existing security protocols and enhance their overall operational efficiency. Practical use cases for iothackbot include automating the identification of ONVIF devices, performing hardware testing via UART or telnet, and analyzing firmware for malicious code. These capabilities make it an invaluable tool for security teams looking to bolster their defenses against emerging IoT threats. With its focus on automation and efficiency, iothackbot is a crucial addition for anyone looking to enhance their IoT security posture.
1. **Prepare Your Environment:** Ensure IoTHackBot is installed in your Claude Code environment or Python toolchain. Run `pip install iothackbot` if not already installed. 2. **Define Your Target:** Replace [TARGET_DEVICE_IP_OR_HOSTNAME] with the IP address or hostname of the IoT device (e.g., 192.168.1.100 or camera.local). 3. **Customize the Scan:** Specify the vulnerabilities to check using [SPECIFIC_VULNERABILITIES_TO_CHECK]. For example, focus on 'default credentials, outdated firmware, and exposed ports'. 4. **Run the Scan:** Execute the prompt in your AI assistant or terminal. IoTHackBot will perform a non-intrusive scan and generate a report. 5. **Review and Act:** Analyze the report, prioritize critical findings, and implement remediation steps. Use the 'Proof of Concept' sections for validation. **Tips:** - For external devices, ensure you have permission to scan. Use a VPN or isolated network for sensitive environments. - Combine IoTHackBot with tools like Nmap or Wireshark for deeper analysis if needed. - Schedule regular scans to catch new vulnerabilities as firmware or configurations change.
Automate the discovery of ONVIF devices on a network to identify potential security risks.
Perform authentication bypass testing and credential brute-forcing on ONVIF devices.
Analyze network traffic for IoT protocols to detect vulnerabilities in real-time.
Extract and analyze firmware from IoT devices to identify malicious code or vulnerabilities.
No install command available. Check the GitHub repository for manual installation instructions.
git clone https://github.com/BrownFineSecurity/iothackbotCopy the install command above and run it in your terminal.
Launch Claude Code, Cursor, or your preferred AI coding agent.
Use the prompt template or examples below to test the skill.
Adapt the skill to your specific use case and workflow.
Run IoTHackBot to perform a vulnerability scan on [TARGET_DEVICE_IP_OR_HOSTNAME]. Focus on [SPECIFIC_VULNERABILITIES_TO_CHECK: e.g., default credentials, outdated firmware, exposed ports, or known CVEs]. Generate a report with actionable remediation steps for [SECURITY_TEAM_OR_CONTACT]. Include severity ratings and exploitability proof-of-concept if available.
### IoTHackBot Vulnerability Scan Report **Target:** 192.168.1.100 (Smart IP Camera - Model: XC-4500, Firmware: v2.3.1) **Scan ID:** IOT-2024-05-14-001 **Timestamp:** 2024-05-14 14:32:00 UTC #### Critical Findings (Severity: High) 1. **Default Credentials Exploit** - **Vulnerability:** Admin interface accessible via default credentials (admin:admin). - **Proof of Concept:** Successfully authenticated via HTTP POST to `/login.cgi` with default credentials. - **Impact:** Full device takeover, potential lateral movement in network. - **Remediation:** Change default credentials immediately and enable two-factor authentication if supported. 2. **Outdated Firmware (CVE-2023-12345)** - **Vulnerability:** Firmware version v2.3.1 is outdated and contains a known RCE vulnerability. - **CVSS Score:** 9.8 (Critical) - **Remediation:** Upgrade to firmware v2.4.0 or later. Block external access to firmware update endpoints. 3. **Exposed Telnet Service** - **Vulnerability:** Telnet service running on port 23 with no authentication. - **Impact:** Unauthorized access to device shell, potential for persistent malware installation. - **Remediation:** Disable Telnet and replace with SSH. Restrict access via firewall rules. #### Medium Findings (Severity: Medium) 1. **Hardcoded SSH Key** - **Vulnerability:** SSH private key found in `/etc/ssh/sshd_config` with weak permissions. - **Remediation:** Regenerate SSH keys and restrict file permissions to 600. 2. **Open Ports 8080 (HTTP) and 554 (RTSP)** - **Vulnerability:** Unnecessary services exposed to the internet. - **Remediation:** Close ports 8080 and 554 unless required for operations. Use VPN or VLAN segmentation. #### Low Findings (Severity: Low) 1. **Information Disclosure** - **Vulnerability:** Device responds to OPTIONS requests with server version (Apache/2.4.41). - **Remediation:** Disable server version disclosure in Apache configuration. #### Recommendations - **Immediate Actions:** Change default credentials, disable Telnet, and upgrade firmware. - **Network Segmentation:** Isolate the device in a dedicated VLAN to limit lateral movement. - **Monitoring:** Deploy intrusion detection rules to alert on unauthorized access attempts. **Next Steps:** Schedule a follow-up scan after remediation to verify fixes. Share this report with [SECURITY_TEAM_EMAIL] for prioritization.
AI assistant built for thoughtful, nuanced conversation
IronCalc is a spreadsheet engine and ecosystem
ITIL-aligned IT service management platform
Customer feedback management made simple
Enterprise workflow automation and service management platform
Automate your spreadsheet tasks with AI power
Take a free 3-minute scan and get personalized AI skill recommendations.
Take free scan