Vulnerable IoT Labs
𧨠Vulnerable IoT Labs & Simulations
1. Damn Vulnerable IoT Device (DVID)
What it is: A purposely vulnerable IoT firmware emulation environment.
Covers: Web interface flaws, misconfigured services (like Telnet, FTP), weak credentials.
Emulates real embedded Linux firmware.
2. DVIA-v2 for IoT (Coming Soon)
From the creators of Damn Vulnerable iOS App.
Check https://github.com/prateek147/DVIA-v2 β planned IoT branch to include insecure BLE, MQTT, etc.
3. IoTGoat (OWASP Project)
What it is: OWASPβs official vulnerable IoT firmware image.
Focus: Real IoT flaws including default creds, open services, insecure protocols.
Includes: Config issues, OTA vulnerabilities, cloud misconfigs.
GitHub: https://github.com/OWASP/IoTGoat
4. RouterSploit + Custom Firmware
What it is: A framework like Metasploit but for embedded devices and routers.
Combine with:
Emulated firmware (e.g., from D-Link, TP-Link, Netgear)
QEMU or Firmadyne
5. Attify IoT Pentesting Workshop Labs
Labs from one of the best-known IoT security companies.
Covers: Firmware extraction, UART, SPI, mobile app exploitation, BLE hacking.
Bonus: Companion to the Attify OS (preconfigured pentesting distro).
βοΈ Tools & Frameworks for IoT Pentesting
Binwalk
Extract and analyze firmware images
Firmware Analysis Toolkit (FAT)
Automates emulating Linux-based firmware
Firmadyne
Full Linux firmware emulation for dynamic testing
Frida / Objection
Mobile apps that interface with IoT devices
Ghidra / IDA Free
Reverse engineering binaries in firmware
MQTT-Spy / Mosquitto
Test insecure MQTT communication
BLEah / Gattacker
Bluetooth Low Energy fuzzing
Shodan / Censys
Find real-world exposed IoT devices (for research only!)
USBlyzer / Logic Analyzers
Hardware comms analysis (USB/UART/SPI)
π§ͺ Emulated IoT Testing Platforms
πΉ Firmwalker
Scans extracted firmware filesystems for sensitive data (SSH keys, passwords).
Use alongside Binwalk or Firmadyne.
πΉ Qiling Framework
A modern emulation engine for dynamic firmware analysis.
Supports ARM, MIPS, x86, and more.
Great for binary instrumentation and runtime hooks.
πΉ IoT-Analyzer
Scans for insecure hardcoded creds, SSL issues, and known CVEs in firmware.
π§± Hardware Pentesting (If You Have Real Devices)
UART
TTL-to-USB adapter, screen/minicom
JTAG
JTAGulator, OpenOCD
SPI Flash
Bus Pirate, Flashrom
SD Cards
Use dd + hex editors to dump and analyze partitions
Note: You can practice on old routers, IP cameras, or even smart light bulbs.
π Online Platforms for IoT Pentesting
πΉ TryHackMe β βSmart Devicesβ Room
Covers insecure MQTT, cloud service abuse, and weak device APIs.
πΉ Hack The Box β IoT Challenges
Occasionally releases IoT-specific boxes with embedded services.
Good for firmware cracking, reverse engineering, and C2 logic.
πΉ IoT Security Foundation Labs (Free Resources)
Whitepapers, lab designs, and testing guidance.
π§ IoT Pentesting Learning Path (Structured)
πΉ Phase 1
Firmware analysis (static)
Binwalk, Firmwalker, IoTGoat
πΉ Phase 2
Firmware emulation
Firmadyne, FAT, QEMU
πΉ Phase 3
Network attack surface
Nmap, MQTTScan, RouterSploit
πΉ Phase 4
Hardware interfaces
UART, SPI, JTAG practice
πΉ Phase 5
Mobile & BLE testing
Frida, BLEah, mobile client analysis
πΉ Phase 6
Cloud / API abuse
TryHackMe, Shodan IoT devices
πΉ Phase 7
Reporting & mitigation
OWASP IoT Top 10, CVE mapping
6. ExplIoT
What it is: Modular framework for IoT attack automation.
Covers: BLE fuzzing, MQTT testing, UPnP attacks, SSDP enumeration, Zigbee.
Good for: Building and executing repeatable test cases across multiple IoT protocols.
7. CIRCLβs IoT Sandbox
Live virtualized vulnerable IoT environments (includes UPnP, TR-069, insecure services).
Use via VPN access for legal cloud-based testing.
Request access: https://www.circl.lu/services/iot-sandbox/
8. IOT-SEED Labs
Free educational labs covering:
Insecure firmware update
Command injection
Backdoors
MQTT vulnerabilities
Well-suited for classrooms and DIY training labs.
9. MIRAI IoT Honeypot Lab
Recreate a vulnerable IoT botnet scenario (Mirai-based).
Set up cameras, DVRs, and routers with default creds.
Practice detection + containment.
10. WiFi Hacking IoT Scenarios
Tools like
Wifiphisher
,airgeddon
, andEvilAP
simulate rogue AP attacks common in IoT onboarding.Practice attacking:
Smart plugs
WiFi cameras
ESP8266/ESP32 boards
π Real IoT Firmware Sources for Reverse Engineering
Want to practice on real, in-the-wild firmware? Hereβs where to legally get them:
Firmware Archive (Firmadyne dataset)
2000+ real firmware images
IoT Inspector Firmware DB
Publicly shared firmwares, linked with CVEs
OpenWRT & DD-WRT
Open-source router firmware
Vendor FTPs (D-Link, TP-Link)
Many still expose firmware archives online
Firmware Analysis Challenge (by CMU)
RE + analysis on captured IoT firmware
βοΈ Real Exploits & Attack References
Exploitee.rs
Huge collection of real IoT exploits
CVE-Details (IoT filter)
Vulnerabilities in specific models
FullDisclosure / Packet Storm
Zero-days and older IoT firmware exploits
π οΈ Advanced IoT Pentesting Tools
Wireshark with Zigbee dissector
Sniff Zigbee traffic (requires radio)
RFcat + Yardstick One
Radio-based attacks (Sub-GHz)
HackRF + SDRSharp
Replay and fuzz RF signals from smart home devices
Ghidra + Binwalk + QEMU combo
Reverse, extract, emulate firmware images
Bettercap
Man-in-the-middle over BLE, WiFi, and even Ethernet
MQTTSA
MQTT Security Auditor for fuzzing and misconfig detection
Zigbee2MQTT logs
For capturing and fuzzing Zigbee payloads
π¦ IoT Hardware Thatβs Great for Practice
ESP8266 / ESP32 dev boards
Flashing firmware, OTA abuse, WiFi onboarding
TP-Link routers (older models)
Web exploits, backdoor analysis
Wyze or D-Link IP cams
Reverse engineering, Telnet/FTP abuse
Smart plugs (Tuya-based)
Cloud APIs, mobile app sniffing
BLE-enabled fitness trackers
MITM via GATT tools or BLEah
Zigbee smart bulbs
Zigbee protocol fuzzing and spoofing
π§ Advanced Learning Path for IoT Pentesting
1
π Firmware Recon
Binwalk, Firmwalker, Ghidra
2
π οΈ Emulation
Firmadyne, QEMU, FAT
3
π Network Enumeration
Nmap, MQTTSpy, Shodan
4
π‘ Radio/Protocol Attacks
HackRF, Yardstick, Wireshark
5
π² Mobile App + Cloud Abuse
Frida, Objection, APKTool
6
π§ͺ BLE & Zigbee
BLEah, Gattacker, Zigbee2MQTT
7
π» Hardware Interfaces
UART/JTAG, SPI flash dumps
8
π Secure Dev & Reporting
OWASP IoT Top 10 + SBOM review
Last updated
Was this helpful?