SkyLine
  • SkyLine | Introduction
    • Module Overview
    • SkyLine's Development
    • Skyline's Reason
    • SkyLine Syntax
    • SkyLine Concepts
      • Concepts | Modes
  • SkyLine | Technologies
    • Module Overview
    • REPL
      • REPL - Basic usage
      • REPL - Console Design
      • REPL - Commands
    • SLC
      • SLC - What is it
      • SLC - Use cases
      • SLC - Lexical Analysis
      • SLC - Intro To Development
      • SLC - Error System
  • SkyLine | Theory
    • Module Overview
    • Theory | Type Systems
      • Objects | Strings
      • Objects | Integers & Floats
  • SkyLine | Development
    • Module Overview
    • Development | Hello Integers?
  • SL | Hybrid Development
    • Module Overview
    • Hybrid Projects | Advancing
    • Hybrid Projects | Wrapping
    • Hybrid Projects | Using SLC
  • SkyLine | For Abusers
    • SL Abuser | Security Research
    • SL Abuser | Module Overview
    • SL Abuser | Abusing Helps
  • SkyLine Experiments
    • Introduction To Module
      • Caster - IoT Manipulation With SkyLine
        • Caster In Real World Scenarios
          • Cracking The Grounds
        • Caster: Setting Up
        • Caster - Running Caster
        • Caster - Dev Manipulation
          • Caster - Console
          • Caster - Apple Devs
          • Caster - Amazon Devs
          • Caster - Google Devs
          • Caster - Roku Devs
      • SkyNeXt - Hacking The Skies
      • SkyLine - PwnLib
Powered by GitBook
On this page
  1. SkyLine Experiments
  2. Introduction To Module
  3. Caster - IoT Manipulation With SkyLine

Caster In Real World Scenarios

Using Caster In Real World Testing Scenarios

Some would argue that Caster can not be used in real-world scenarios, well, we like to argue and say that is and is not correct at the same time.

Currently, the team members associated with the SkyPenguin-Labs security research team are working on a global 500+ page IoT security research paper purely based on 20 different devices. This research paper really could only be proven in some aspects if certain actions on a device could be recreated. Caster automates a ton of information gathering and enumeration as well as changing settings on devices.

Because of this, Caster continues to power the IoT research side of things because it can help us easily gather information, save it to an output, and generate reports based on the information provided. So, this is where Caster can be used for real-world security research. Sometimes, you do not always need a whole framework to automate and replicate exploits since your first stage should almost always be information gathering.

We have also used Caster in multiple other scenarios to demonstrate the idea of using security features on devices like the Google Chromecast and various others by disallowing any external connections that are not verified ( which Caster bypasses to an extent ).

PreviousCaster - IoT Manipulation With SkyLineNextCracking The Grounds

Last updated 1 year ago

Page cover image