What is FSTM?
FSTM or OWASP Firmware Security Testing Methodology is the open security methodology developed by OWASP to address firmware security testing.
FSTM serves as a guide to define the activities required by a security analyst to perform an IOT security audit.
OWASP FSTM also publishes the Top 10 security problems that affect IoT devices, highlighting the use of insecure passwords.
Cybersecurity articles related to OWASP FSTM
Here are some technical articles on cybersecurity related to OWASP FSTM that have been published on Tarlogic’s website.
- Introduction: IoT and embedded devices security analysis following OWASP
- OWASP FSTM, stage 1: Information gathering and reconnaissance
- OWASP FSTM, stage 2: Obtaining IOT device firmware
- OWASP FSTM, stage 3: Analyzing firmware
- OWASP FSTM, stage 4: Extracting the filesystem
- OWASP FSTM, stage 5: Analyzing filesystem contents
- OWASP FSTM, stage 6: firmware emulation
- OWASP FSTM, stage 7: Dynamic analysis
- OWASP FSTM, stage 8: Runtime analysis
- OWASP FSTM, Stage 9: Exploitation of executables
- Best practices: IoT Security assessment
Cybersecurity services related to FSTM
IoT Security Testing: The IoT security assessment services allow to identify potential security issues of the device, understand security flaws in the data exchange process, and analyze the security implications of the technology used.
- More information: IoT Security Testing
Reverse Engineering and Hardware Hacking services: Security evaluation of hardware devices through physical ports and reverse engineering tests of software and firmware to assess the protection of a binary
- More information: Reverse Engineering and Hardware Hacking services