Metasploit Hardware Testing: A New Dimension in Security
Metasploit Hardware Testing Feature allows you to test and integrate hardware, such as IoT devices, consumer electronics, and even motor vehicle hardware and software systems. Discover how to test hardware with Metasploit, and even better, you can download this powerful hardware testing tool for free.
Metasploit’s Expanding Capabilities
Metasploit is renowned for its extensive collection of exploits (exps) and modules, with a robust community specializing in creating modules and scripts. Now, Metasploit introduces a game-changing feature that empowers users to create their own scripts for hardware testing. This updated version of Metasploit includes a “hardware bridge API” that supports testing various hardware, including components like the CAN bus in cars.
Exploring Metasploit Hardware Testing Modes
Metasploit offers two modes for hardware testing:
1. Direct Compilation into Firmware: This mode ensures that the device is compatible with Metasploit. It is suitable for devices that support direct compilation into their firmware, making them Metasploit-ready.
If the hardware device cannot communicate via Ethernet, you have to set up a relay service. Many hardware tools, such as Software Radio (SDR), can only be controlled via USB. To connect these devices to Metasploit, you’ll need to run a relay service using the REST API.
Testing Your Hardware with Metasploit
The newly released version of Metasploit now supports SocketCAN, making it compatible with Linux systems that support SocketCAN. If you have a Linux system and a SocketCAN-compatible CAN bus sniffer, you’re ready to begin testing. The local_hwbridge module serves as a simple example of a relay service, which you can run either locally or on a remote server.
msf > use auxiliary/server/local_hwbridge msf auxiliary(local_hwbridge) > run [*] Auxiliary module execution completed [*] Using URL: http://0.0.0.0:8080/6xOv7GqFs3YTeIE [*] Local IP: http://10.1.10.21:8080/6xOv7GqFs3YTeIE [*] Server started. msf auxiliary(local_hwbridge) >
Two Modes of Testing With Metasploit
The local_hwbridge module can detect SocketCAN data by default, without requiring any additional options. The relay service does not need to run within Metasploit itself if the hardware supports the REST API. To connect the device, you can use the following commands:
msf > use auxiliary/client/hwbridge/connect msf auxiliary(connect) > set rhost 10.1.10.21 rhost => 10.1.10.21 msf auxiliary(connect) > set targeturi 6xOv7GqFs3YTeIE targeturi => 6xOv7GqFs3YTeIE msf auxiliary(connect) > run
Once the device is connected, an HWBridge session is established. If you’re familiar with Meterpreter, you’ll find using hwbridge intuitive. You can use various commands or run specific modules, such as “getvinfo.”
A Wide Range of Commands
msf auxiliary(connect) > sessions Active sessions =============== Id Type Information Connection -- ---- ----------- ---------- 1 hwbridge cmd/hardware automotive 127.0.0.1 -> 127.0.0.1 (10.1.10.21)
Metasploit offers an extensive list of commands that enable in-depth hardware testing. You can explore different parameters, pull real-time data, and customize your testing experience.
The Future of Metasploit Hardware Testing
This marks the first update of the “hardware bridge API,” focused primarily on automotive system testing. Rapid7, the company behind Metasploit, promises to add more features in the future.
Metasploit aims to become the tool of choice for hardware testing, including SCADA and Industrial Control System (ICS) testing, Internet of Things (IoT) testing, and Software Defined Radio (SDR). This transition signifies Metasploit’s evolution from being a software-centric framework to a comprehensive solution for both hardware and software.
Is Metasploit Hardware Testing Available for Free?
Craig Smith, the Director of Transportation Research at Rapid7, emphasizes that with the growing convergence of hardware and software in various devices, including cars and appliances, the “hardware bridge” enables users to step out of the digital realm and interact directly with physical equipment. He also underlines the commitment to provide security experts with the resources they need to thoroughly test their products for safety.
For more information about Metasploit and its hardware testing capabilities, visit the official website: Metasploit Official Website.