Crash the IoT Train Yourself - Intentionally Vulnerable WRT IV WRT
Offered By: YouTube
Course Description
Overview
Explore the world of Internet of Things (IoT) security vulnerabilities in this BSidesLV 2015 conference talk. Dive into common IoT devices, standalone devices, and potential security risks associated with them. Learn about firmware backdoors, default credentials, open-source drivers, and the importance of firmware signing. Examine vulnerable web applications, hardware, and software in IoT devices. Watch a live demonstration of authentication bypass and cross-site scripting attacks. Gain insights into securing IoT devices and understanding the potential risks in this rapidly growing field.
Syllabus
Intro
Jami
Security
Internet of Things
IoT Device
What is a Device
Common Devices
Standalone Devices
Loon
Paul
Firmware Backdoors
Default credentials
Telnet
Open Source Drivers
Sprintf
Firmware Signing
Tesla
Web Interface
Protocols
Vulnerable Web Apps
Vulnerable Hardware
Vulnerable Software
Authentication Bypass
Nick Curran
Demo
Logging Out
Crosssite scripting
Related Courses
A developer's guide to the Internet of Things (IoT)IBM via Coursera Enterprise and Infrastructure Security
New York University (NYU) via Coursera Getting Started with the Internet of Things (IoT)
Microsoft via edX AWS IoT: Developing and Deploying an Internet of Things
Amazon Web Services via edX Components And Applications Of Internet Of Things
Indian Institute of Technology Patna via Swayam