YoVDO

Crash the IoT Train Yourself - Intentionally Vulnerable WRT IV WRT

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Ethical Hacking Courses Software Security Courses Hardware Security Courses IoT security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the world of Internet of Things (IoT) security vulnerabilities in this BSidesLV 2015 conference talk. Dive into common IoT devices, standalone devices, and potential security risks associated with them. Learn about firmware backdoors, default credentials, open-source drivers, and the importance of firmware signing. Examine vulnerable web applications, hardware, and software in IoT devices. Watch a live demonstration of authentication bypass and cross-site scripting attacks. Gain insights into securing IoT devices and understanding the potential risks in this rapidly growing field.

Syllabus

Intro
Jami
Security
Internet of Things
IoT Device
What is a Device
Common Devices
Standalone Devices
Loon
Paul
Firmware Backdoors
Default credentials
Telnet
Open Source Drivers
Sprintf
Firmware Signing
Tesla
Web Interface
Protocols
Vulnerable Web Apps
Vulnerable Hardware
Vulnerable Software
Authentication Bypass
Nick Curran
Demo
Logging Out
Crosssite scripting


Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube