YoVDO

Years of IoT Vulnerability Research and Countless 0days - A Retrospective - DefCamp - 2021

Offered By: DefCamp via YouTube

Tags

DefCamp Courses MQTT Courses Command Injection Courses

Course Description

Overview

Explore a comprehensive retrospective on five years of IoT vulnerability research and numerous zero-day exploits presented at DefCamp 2021. Delve into topics such as reusable attack vectors, authentication packets, cloud implementations, command injection, MQTT and RSTP leaks, buffer overflow, and cloud-related attacks. Gain insights on vulnerability tracking, policy changes, and strategies for avoiding high-profile brands in IoT security research. Learn from hands-on experiences and practical approaches to identifying and addressing security vulnerabilities in the rapidly evolving Internet of Things landscape.

Syllabus

Introduction
Welcome
About me
Vulnerability research
Publishing
Reusable attack vectors
Authentication packets
Cloud implementations
Command injection
MQTT
MQTT Leak
RSTP Leak
Buffer Overflow
Cloud related attacks
Avoid highprofile brands
Vulnerability tracking
Policy changes


Taught by

DefCamp

Related Courses

Hacking and Patching
University of Colorado System via Coursera
Identifying Security Vulnerabilities
University of California, Davis via Coursera
Specialized Testing: Command Injection
Pluralsight
Input Validation Testing with Burp Suite
Pluralsight
Ivanti Connect Secure VPN Vulnerability: What You Should Know
Pluralsight