![]() Moreover we want to enable additional tricks to force DNS traffic and log requests coming from eth1: cat /etc/iptables/rules.v4 To make the Internet reachable from devices attached to eth1 we need to enable NAT. Edit /etc/nf and set: _forward=1Īt the end reload sysctl settings: sysctl -p To enable the Pi to act as a router we have to enable IPv4 forwarding. The first one is configured by default with DHCP, the second one must be configured: cat /etc/network/interfaces.d/eth0 We expect our Pi acts as a router, so we need to configure two network interfaces. We want to disable embedded Bluetooth and wireless adapters: echo "dtoverlay=disable-bt" > /boot/config.txtĮcho "dtoverlay=disable-wifi" > /boot/config.txtĪ reboot is suggested to apply all the above configurations. ![]() ![]() We need to install some packages required in the next steps: apt-get updateĪpt-get install iptables-persistent dnsmasqįinally, maybe we want to adjust the keyboard and timezone: dpkg-reconfigure keyboard-configuration By default SSH is enabled on Kali Linux: systemctl start ssh First bootĪfter the first boot, we can start to configure our Raspberry Pi. The Kali Linux ARM image can be dumped to the microSD using The Linux device will provide an Internet connection to the IoT device dumping all traffic data and metadata and intercepting encrypted traffic also. The design is simple: we want a flexible device (Linux based) to intercept any Ethernet/IP traffic emitted by the IoT device. To answer those questions, we are building a small and cheap IoT testing lab. The question is: how much can we trust those IoT devices? In which way our digital security and privacy is affected? As private individuals we are using a lot of consumer IoT devices: almost any standard home equipment can now be remotely controlled by a specific application installed on a smartphone. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |