TranSec Save

Internet of Vehicles Penetration testing OS.车联网渗透测试系统,开箱即用的测试环境,包含上百个常见用于车联网渗透测试的工具集。覆盖逆向、CAN、车载以太网、WiFi、蓝牙、云平台等安全测试

Project README

English | 简体中文

TranSec OS

TranSec OS is a car networking penetration testing distribution system based on Ubuntu 18.04, mainly used for security assessment of car networking devices. The system is equipped with hundreds of dedicated testing tools for vehicle networking security, aiming to solve a series of problems for vehicle networking security practitioners, such as messy testing tools, complex testing environment configuration, and no available tools

Advantages

An out of the box testing environment that includes hundreds of commonly used toolsets for penetration testing of the Internet of Vehicles. Covering security tests such as reverse engineering, CAN, in car Ethernet, WiFi, Bluetooth, cloud platforms, etc

  • Permanent free update support, and gradually increasing the targeted free trial of Anheng's self-developed vehicle networking tools and some commercial software in the future
  • An open operating environment that allows users to customize and modify any file or install any program within the system
  • Built in various commonly used tools under different architectures such as ARM, X86, MIPS, etc., such as adb, gdb, nmap, busybox, etc
  • ...

Tool List (Partial)

Below are some of the tools listed, and more tools can be explored by yourself.

Tool Name Tool Introduction
CANToolz CAN Analysis Framework
Can Utils Can's testing toolkit
Scapy Packet Processing Tool
Proxmark3 PM3 client
Logic Logic analyzer client
URH Radio Analysis Tools
MQTTclient MQTT client
Gattool BLE Connection Tool
Binwalk Firmware unpacking and analysis tool
IDA Free Professional binary analysis tool
Shambles Professional binary analysis and vulnerability scanning tool, including automatic unpacking and simulation
Ghidra Open source binary analysis tool
Jeb Android Reverse Analysis Tool
Jadx Gui Open source Android reverse analysis tool
Hcitool Bluetooth Connection Tool
Ubertool tools A software and hardware open-source Bluetooth packet catcher
Pybluez2 Python library - Bluetooth attack tool
KillerBee Security research tool for ZigBee
HackRF HackRF supporting software
Frida hook tool
Gdb multiarch Heterogeneous architecture gdb analysis tool
Pwndbg gdb Advanced Script
Pwntools Python vulnerability exploitation framework
QEMU Open Source Simulator
Qemu system Virtual System Simulator
Firmware Mod Kit Firmware Modification Kit
Firmware Analysis Toolkit An open-source firmware analysis tool
Frp Internal network penetration tool
MobSF Android Automated Static Analysis Tool
Burpsuite Web testing tool

Download

Installation instructions

This system provides ISO image installation and OVA image import installation methods. It is recommended to use OVA to import virtual machines for simpler and more convenient operations. Due to the large size of the system, importing or installing requires a certain amount of time, which depends on the performance of the disk.

After successful import or installation, boot up and use iov/root to login. After successful login, the user experience plan will be displayed, and you can choose to agree or refuse. Once confirmed, you can start using it.

image

OVA import

Open the OVA file using virtual machine software:

image

ISO installation

When installing using ISO images, it is recommended to configure 50GB of disk and 4GB of memory. After loading the image, select 'Boot system install' to enter the installation process:

image

Enter the password iov/root to login to the installation interface:

image

Enter account password and other information according to the prompts, and click Next to enter the partition process:

image

After selecting the disk, click Delete to delete the partition:

image

At this point, a /dev/sda? will appear, Select /dev/sda?, Click on the arrow

image

At this point, /dev/sda becomes /dev/sda1. Select this partition, select the mounted directory (/) and partition format (ext4) from the drop-down menu on the right, and click the arrow again to complete the partition:

image

Returning to the installation process, after checking the box containing user configuration and data (must be changed to √), proceed to the next step to proceed with the installation

image

The installation time is about 6 minutes. After the progress is completed, click reboot to complete the installation process and enter the system (If you have other things to do, you can do them first. After the system installation is completed, it will automatically restart after 30 seconds ^o^)

image

System screenshot

image

image

image

image

Possible installation issues

Due to being based on the systemback, there may be some issues during system installation. Below are the corresponding solutions:

  1. When using the ISO installation method, when logging into the installation interface, the prompt "Cannot start the Systemback graphical user interface! Unable to connect to the X server" or other reasons for not entering the installation interface may be due to the installation program not starting successfully. It is recommended to shut down the computer first and then try installing again. Please be careful not to restart directly.

  2. After importing OVA, it may not be possible to connect to the network. Please restart the system or reconnect to the network in the upper right corner (Wired Connected - Turn Off ->connect).

  3. When entering the installation interface or first time and logging into the system for the first time after installation, there will be a long black screen waiting time. This is because there are many services to start, which is a normal phenomenon

Finally

Thank you for your use. If you have any questions, please provide feedback on ISSUS. We will pay attention to each issue and try to improve it in the next version. Thank you again.

Open Source Agenda is not affiliated with "TranSec" Project. README Source: TianWen-Lab/TranSec

Open Source Agenda Badge

Open Source Agenda Rating