SecurityTube Offensive Internet of Things (IoT) Exploitation

001 Introduction to IoT Security
002 b Setting up your IoT pentesting VM
002 Mapping Attack surface and previous vulnerabilities
003 a Firmware Analysis 101
003 Firmware analysis Identifying hardcoded secrets
004 Emulating firmware binary
005 Backdooring a firmware 1
006 Backdooring a firmware 2
007 Firmware Emulation using FAT
008 Web application security for IoT devices
009 Using Burp for IoT Web app security
010 Exploiting Command Injection Part 1
011 Exploiting Command Injection Part 2
012 CSRF and Firmware diffing
013 Conventional Attack vectors
014 Conventional attack vectors Password cracking
015 Analysing Smart Plug Getting started
016 Reversing Smart plug encryption
017 Controlling Smart Plug
018 Getting started with ARM
019 Buffer overflow on ARM
020 Exploit Development on ARM
021 Using Radare2 for MIPS binary analysis
022 Exploitation using GDB remote debugging on MIPS
023 Introduction to Serial Interfacing and UART
024 Serial interfacing over UART
025 NAND Glitching
026 SPI and I2C Introduction and Dumping data
027 Writing and Reading EEPROM using Arduino
028 Introduction to JTAG
029 Identifying JTAG pinouts using Arduino
030 JTAGulator
031 Debugging with JTAG
032 Introduction to SDR
033 Getting started with GNU Radio companion
034 Decoding captured AM Signal
035 Capturing FM signals using RTL SDR
036 Analysing wireless doorbells using RTL SDR
037 Extracting text from signal
038 Extracting text from Signal part 2 (using Audacity)
039 a Introduction to BLE
039 b BLE Cracking and Pairing modes
040 Sniffing BLE using Ubertooth
041 Introduction to Zigbee and Sniffing
042 a Zigbee Exploitation part one
042 b Zigbee Exploitation Part 2

©2021 | All rights reserved.