Crash the IoT Train Yourself - Intentionally Vulnerable WRT IV WRT
Offered By: YouTube
Course Description
Overview
Explore the world of Internet of Things (IoT) security vulnerabilities in this BSidesLV 2015 conference talk. Dive into common IoT devices, standalone devices, and potential security risks associated with them. Learn about firmware backdoors, default credentials, open-source drivers, and the importance of firmware signing. Examine vulnerable web applications, hardware, and software in IoT devices. Watch a live demonstration of authentication bypass and cross-site scripting attacks. Gain insights into securing IoT devices and understanding the potential risks in this rapidly growing field.
Syllabus
Intro
Jami
Security
Internet of Things
IoT Device
What is a Device
Common Devices
Standalone Devices
Loon
Paul
Firmware Backdoors
Default credentials
Telnet
Open Source Drivers
Sprintf
Firmware Signing
Tesla
Web Interface
Protocols
Vulnerable Web Apps
Vulnerable Hardware
Vulnerable Software
Authentication Bypass
Nick Curran
Demo
Logging Out
Crosssite scripting
Related Courses
Pattern-Oriented Software Architectures: Programming Mobile Services for Android Handheld SystemsVanderbilt University via Coursera Engineering Maintainable Android Apps
Vanderbilt University via Coursera Software Design as an Element of the Software Development Lifecycle
University of Colorado System via Coursera Secure Software Development
Pluralsight Secure Software Concepts for CSSLPĀ®
Pluralsight