Skip to content

Commit

Permalink
Browse files Browse the repository at this point in the history
  • Loading branch information
cldrn committed Aug 2, 2021
2 parents 35c666b + 813afb9 commit e5e6d3d
Show file tree
Hide file tree
Showing 3 changed files with 43 additions and 16 deletions.
10 changes: 4 additions & 6 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,10 +1,10 @@
# CatSniffer

CatSniffer is an original multiprotocol board made for IoT (Internet of Things). It has a design type "USB stick" that allows easy transport and use anytime, anywhere. It integrates a CC1352 chip from TI, SX1262, and SAMD21E17, all of the new generation.
CatSniffer is an original multiprotocol and multiband board made for sniffing and communicating with IoT (Internet of Things) devices. It was designed as a highly portable USB stick that integrates the new generation of the chips TI CC1352, Semtech SX1262, and Microchip SAMD21E17.

This board is an auditing tool for wireless network devices that allows the user to detect high bandwidth consumptions and take early actions against malicious agents.
This board is an auditing tool for security researchers looking into IoT security. The board can be used with different types of software including third-party sniffers such as [SmartRF Packet Sniffer](https://www.ti.com/tool/PACKET-SNIFFER), [Sniffle](https://github.com/nccgroup/Sniffle), [zigbee2mqtt](https://github.com/Koenkk/zigbee2mqtt), [Z-Stack-firmware](https://github.com/Koenkk/Z-Stack-firmware), our custom firmware images, or you can even write your own firmware for your hacking needs.

This work was inspired by our friend's work [Michael Ossmann](https://twitter.com/michaelossmann) as a tribute to his outstanding job in [Greatscott Gadgets](https://greatscottgadgets.com/), making devices like YardStick, GreatFET, HackRF, and Ubertooth.
This work was inspired by our friend's work [Michael Ossmann](https://twitter.com/michaelossmann) as a tribute to his outstanding job in [Greatscott Gadgets](https://greatscottgadgets.com/), making devices like the YardStick, GreatFET, HackRF, and Ubertooth.


## Protocols
Expand All @@ -14,8 +14,7 @@ This work was inspired by our friend's work [Michael Ossmann](https://twitter.co
- IEEE 802.15.4g
- 6LoWPAN (IPv6 over Low power Wireless Personal Area Networks)
- Sub 1GHz and patented systems
- LoRa
- LoRaWAN
- LoRa/LoRaWAN


## Features
Expand All @@ -42,7 +41,6 @@ This work was inspired by our friend's work [Michael Ossmann](https://twitter.co
- SimpleLink CC13x2 and CC26x2 SDK 3.40.00.02



## Note
This kit is designed to allow Product developers to evaluate electronic components, circuit, or software associated with the kit to determine whether to incorporate such items in a finished product and Software developers to write software applications for use with the end product. This kit is a developer product and when assembled may not be resold or otherwise marketed unless all required FCC (or any other local authority) equipment authorizations are first obtained. Operation is subject to the condition that this product not cause harmful interference to licensed radio stations and that this product accept harmful interference.

Expand Down
9 changes: 9 additions & 0 deletions SECURITY.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
# Security Policy

## Supported Versions

All CatSniffer versions.

## Reporting a Vulnerability

Please submit an issue for reporting vulnerabilities
40 changes: 30 additions & 10 deletions attacks.md
Original file line number Diff line number Diff line change
@@ -1,10 +1,27 @@
# Attacks on IoT protocols

list of possible attacks and available audits
This page intends to document the analysis techniques and attacks applicable to the IoT protocols supported by CatSniffer.

## LoRa/LoRaWAN

- Bit flipping
- [Bit flipping](https://ieeexplore.ieee.org/document/7899554)
- [DoS in ABP mode](https://ieeexplore.ieee.org/document/8366983/authors#authors)
- [ACK Spoofing](https://ieeexplore.ieee.org/document/8366983/authors#authors)
- [LoRa Class B Attacks](https://arxiv.org/pdf/2005.11555.pdf)


### 6LoWPAN
- [Attacks on RPL and 6LoWPAN in IoT](https://ieeexplore.ieee.org/document/7087034)
- [Selective forwarding attack](http://oa.upm.es/65423/1/TFM_JOSE_LUIS_CASTANON_REMY.pdf)
- [Sinkhole attack](http://oa.upm.es/65423/1/TFM_JOSE_LUIS_CASTANON_REMY.pdf)
- [Clone ID attack](http://oa.upm.es/65423/1/TFM_JOSE_LUIS_CASTANON_REMY.pdf)
- [Sybil attack](http://oa.upm.es/65423/1/TFM_JOSE_LUIS_CASTANON_REMY.pdf)
- [Hello flooding](http://oa.upm.es/65423/1/TFM_JOSE_LUIS_CASTANON_REMY.pdf)
- [Wormhole attack](http://oa.upm.es/65423/1/TFM_JOSE_LUIS_CASTANON_REMY.pdf)
- [Blackhole attack](http://oa.upm.es/65423/1/TFM_JOSE_LUIS_CASTANON_REMY.pdf)
- [Denial Of Service](http://oa.upm.es/65423/1/TFM_JOSE_LUIS_CASTANON_REMY.pdf)
- [Alteration and Spoofing attack](http://oa.upm.es/65423/1/TFM_JOSE_LUIS_CASTANON_REMY.pdf)


## BLE
- Handler enumeration
Expand All @@ -13,13 +30,16 @@ list of possible attacks and available audits
- Fuzzing handler values

## Zigbee
- https://www.opencve.io/cve?vendor=mi&product=dgnwg03lm
- [ZigBee vulnerabilities in Xiaomi devices](https://www.opencve.io/cve?vendor=mi&product=dgnwg03lm)
- [Security attacks to ZigBee technology and their
practical realization](http://www.cic.ipn.mx/~pescamilla/MS/papers_2014/DurechandFranekova2014.pdf)

## Thread
-

## IEEE 802.15.4g,
-

### 6LoWPAN
-
- [Thread fundamentals](https://www.silabs.com/documents/public/user-guides/ug103-11-fundamentals-thread.pdf)
- [EM Analysis in the IoT Context: Lessons
Learned from an Attack on Thread](https://tches.iacr.org/index.php/TCHES/article/download/833/785/)

## IEEE 802.15.4g
- [Security considerations](https://people.eecs.berkeley.edu/~daw/papers/15.4-wise04.pdf)
- [Attacks and Defenses in Short-Range
Wireless Technologies for IoT](https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=9090905)

0 comments on commit e5e6d3d

Please sign in to comment.