YoVDO

Network Exploitation of IoT Ecosystems

Offered By: YouTube

Tags

GrrCon Courses Network Protocols Courses IoT security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore network exploitation techniques in IoT ecosystems through this GrrCON 2019 conference talk by Fotios "ithilgore" Chantzis. Delve into the vulnerabilities of various network protocols, including Multicast DNS, IPP, and RTSP. Learn about fundamental flaws in IoT device communication, MDNS poisoning, neighbor cache posing, and common vulnerabilities in IP cameras and medical devices. Gain insights into embedded malware and discover valuable resources for further research on IoT security.

Syllabus

Intro
Agenda
Why research network protocols
Multicast DNS
Probe DNS
Announcement DNS
Scenario
Fundamental flaw
MDN poisoning
N DNS query
Printer response
MDNS poison
IPP poison
Laura
Neighbor cache posing
IP cameras
WS Discovery
RTSP
What is RTSP
Demonstration
Medical devices
Common vulnerabilities
AD brute force
Embedded malware
Resources


Related Courses

AZ-220 - Microsoft Certified: Azure IoT Developer Specialty
A Cloud Guru
Advanced IoT Systems Integration and Industrial Applications
LearnQuest via Coursera
AWS IoT: Developing and Deploying an Internet of Things
Amazon Web Services via edX
Assessing and Managing Secure IoT Applications and Devices
LearnQuest via Coursera
Securing the IoT Landscape: From Inception to Architecture
LearnQuest via Coursera