English | 简体中文
TranSec OS is a car networking penetration testing distribution system based on Ubuntu 18.04, mainly used for security assessment of car networking devices. The system is equipped with hundreds of dedicated testing tools for vehicle networking security, aiming to solve a series of problems for vehicle networking security practitioners, such as messy testing tools, complex testing environment configuration, and no available tools
An out of the box testing environment that includes hundreds of commonly used toolsets for penetration testing of the Internet of Vehicles. Covering security tests such as reverse engineering, CAN, in car Ethernet, WiFi, Bluetooth, cloud platforms, etc
- Permanent free update support, and gradually increasing the targeted free trial of Anheng's self-developed vehicle networking tools and some commercial software in the future
- An open operating environment that allows users to customize and modify any file or install any program within the system
- Built in various commonly used tools under different architectures such as ARM, X86, MIPS, etc., such as adb, gdb, nmap, busybox, etc
- ...
Below are some of the tools listed, and more tools can be explored by yourself.
Tool Name | Tool Introduction |
---|---|
CANToolz | CAN Analysis Framework |
Can Utils | Can's testing toolkit |
Scapy | Packet Processing Tool |
Proxmark3 | PM3 client |
Logic | Logic analyzer client |
URH | Radio Analysis Tools |
MQTTclient | MQTT client |
Gattool | BLE Connection Tool |
Binwalk | Firmware unpacking and analysis tool |
IDA Free | Professional binary analysis tool |
Shambles | Professional binary analysis and vulnerability scanning tool, including automatic unpacking and simulation |
Ghidra | Open source binary analysis tool |
Jeb | Android Reverse Analysis Tool |
Jadx Gui | Open source Android reverse analysis tool |
Hcitool | Bluetooth Connection Tool |
Ubertool tools | A software and hardware open-source Bluetooth packet catcher |
Pybluez2 | Python library - Bluetooth attack tool |
KillerBee | Security research tool for ZigBee |
HackRF | HackRF supporting software |
Frida | hook tool |
Gdb multiarch | Heterogeneous architecture gdb analysis tool |
Pwndbg | gdb Advanced Script |
Pwntools | Python vulnerability exploitation framework |
QEMU | Open Source Simulator |
Qemu system | Virtual System Simulator |
Firmware Mod Kit | Firmware Modification Kit |
Firmware Analysis Toolkit | An open-source firmware analysis tool |
Frp | Internal network penetration tool |
MobSF | Android Automated Static Analysis Tool |
Burpsuite | Web testing tool |
- GitHub:Releases
- Baidu Netdisk:https://pan.baidu.com/s/1jWFxiawgiC57gLCYiSvnyA password:r4x7
This system provides ISO image installation and OVA image import installation methods. It is recommended to use OVA to import virtual machines for simpler and more convenient operations. Due to the large size of the system, importing or installing requires a certain amount of time, which depends on the performance of the disk.
After successful import or installation, boot up and use iov/root
to login. After successful login, the user experience plan will be displayed, and you can choose to agree or refuse. Once confirmed, you can start using it.
Open the OVA file using virtual machine software:
When installing using ISO images, it is recommended to configure 50GB of disk and 4GB of memory. After loading the image, select 'Boot system install' to enter the installation process:
Enter the password iov/root
to login to the installation interface:
Enter account password and other information according to the prompts, and click Next to enter the partition process:
After selecting the disk, click Delete to delete the partition:
At this point, a /dev/sda?
will appear, Select /dev/sda?
, Click on the arrow
At this point, /dev/sda
becomes /dev/sda1
. Select this partition, select the mounted directory (/) and partition format (ext4) from the drop-down menu on the right, and click the arrow again to complete the partition:
Returning to the installation process, after checking the box containing user configuration and data (must be changed to √), proceed to the next step to proceed with the installation
The installation time is about 6 minutes. After the progress is completed, click reboot to complete the installation process and enter the system (If you have other things to do, you can do them first. After the system installation is completed, it will automatically restart after 30 seconds ^o^)
Due to being based on the systemback
, there may be some issues during system installation. Below are the corresponding solutions:
-
When using the ISO installation method, when logging into the installation interface, the prompt "Cannot start the Systemback graphical user interface! Unable to connect to the X server" or other reasons for not entering the installation interface may be due to the installation program not starting successfully. It is recommended to shut down the computer first and then try installing again. Please be careful not to restart directly.
-
After importing OVA, it may not be possible to connect to the network. Please restart the system or reconnect to the network in the upper right corner (Wired Connected - Turn Off ->connect).
-
When entering the installation interface or first time and logging into the system for the first time after installation, there will be a long black screen waiting time. This is because there are many services to start, which is a normal phenomenon
Thank you for your use. If you have any questions, please provide feedback on ISSUS. We will pay attention to each issue and try to improve it in the next version. Thank you again.