YoVDO

Crash the IoT Train Yourself - Intentionally Vulnerable WRT IV WRT

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Ethical Hacking Courses Software Security Courses Hardware Security Courses IoT security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the world of Internet of Things (IoT) security vulnerabilities in this BSidesLV 2015 conference talk. Dive into common IoT devices, standalone devices, and potential security risks associated with them. Learn about firmware backdoors, default credentials, open-source drivers, and the importance of firmware signing. Examine vulnerable web applications, hardware, and software in IoT devices. Watch a live demonstration of authentication bypass and cross-site scripting attacks. Gain insights into securing IoT devices and understanding the potential risks in this rapidly growing field.

Syllabus

Intro
Jami
Security
Internet of Things
IoT Device
What is a Device
Common Devices
Standalone Devices
Loon
Paul
Firmware Backdoors
Default credentials
Telnet
Open Source Drivers
Sprintf
Firmware Signing
Tesla
Web Interface
Protocols
Vulnerable Web Apps
Vulnerable Hardware
Vulnerable Software
Authentication Bypass
Nick Curran
Demo
Logging Out
Crosssite scripting


Related Courses

Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax
MSc Cyber Security
Coventry University via FutureLearn
Network Security - Introduction to Network Security
New York University (NYU) via edX
Network Security - Advanced Topics
New York University (NYU) via edX