Crash the IoT Train Yourself - Intentionally Vulnerable WRT IV WRT
Offered By: YouTube
Course Description
Overview
Explore the world of Internet of Things (IoT) security vulnerabilities in this BSidesLV 2015 conference talk. Dive into common IoT devices, standalone devices, and potential security risks associated with them. Learn about firmware backdoors, default credentials, open-source drivers, and the importance of firmware signing. Examine vulnerable web applications, hardware, and software in IoT devices. Watch a live demonstration of authentication bypass and cross-site scripting attacks. Gain insights into securing IoT devices and understanding the potential risks in this rapidly growing field.
Syllabus
Intro
Jami
Security
Internet of Things
IoT Device
What is a Device
Common Devices
Standalone Devices
Loon
Paul
Firmware Backdoors
Default credentials
Telnet
Open Source Drivers
Sprintf
Firmware Signing
Tesla
Web Interface
Protocols
Vulnerable Web Apps
Vulnerable Hardware
Vulnerable Software
Authentication Bypass
Nick Curran
Demo
Logging Out
Crosssite scripting
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube