Abusing the Internet of Things - Blackouts, Freakouts, and Stakeouts
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the vulnerabilities and security risks associated with Internet of Things (IoT) devices in this eye-opening 43-minute Black Hat conference talk. Delve into the potential dangers of popular smart home devices, including Philips Hue lighting systems, baby monitors, WiFi cameras, and even Tesla vehicles. Learn about the methods hackers can use to exploit these devices, from finding and manipulating bridges to unauthorized monitoring and control. Discover the implications of flat networks, the future of malware, and the importance of proper security measures in IoT ecosystems. Gain insights into real-world examples, including high-profile cases involving public figures, and understand the steps taken by manufacturers to address these issues. Equip yourself with knowledge to better protect your connected devices and understand the evolving landscape of IoT security.
Syllabus
Intro
Why is this important
Devices
Hue
Bridge
Finding the Bridge
Post Requests
Username
Demo
Contacting Philips
IFTTT
The Future of Malware
The Baby Monitor
Unwelcome Monitoring
Belkin Baby Monitor
Script
Flat networks
WiFi camera
Comcast
Tesla
Chris Christie
Tesla Support
Tesla SDK
Tesla Glass
Key Fob
Ethernet Jack
Tesla Vulnerability
Conclusion
Taught by
Black Hat
Related Courses
Ethical HackingIndian Institute of Technology, Kharagpur via Swayam Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax MSc Cyber Security
Coventry University via FutureLearn Network Security - Introduction to Network Security
New York University (NYU) via edX Network Security - Advanced Topics
New York University (NYU) via edX