YoVDO

Taking Over the World Through MQTT - Aftermath

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Ethical Hacking Courses MQTT Courses Database Security Courses

Course Description

Overview

Explore the aftermath of MQTT protocol vulnerabilities in this 40-minute Black Hat conference talk. Delve into the findings from a custom-built endpoint testing tool, examining how protocol data is often stored in SQL databases and the resulting security implications. Analyze the current state of MQTT security, comparing it to the situation from over a year ago. Discover newly identified vulnerable devices and learn about the global response to these security concerns. Gain insights into SQL and server attacks facilitated through the MQTT protocol, and understand the evolving landscape of IoT security threats.

Syllabus

Taking Over the World Through MQTT - Aftermath


Taught by

Black Hat

Related Courses

AWS IoT: Developing and Deploying an Internet of Things
Amazon Web Services via edX
A Subjective Introduction to the IoT
ITMO University via edX
IoT Networking and Fog Layer Devices
ITMO University via edX
Introducción al Internet de las cosas (IoT) y sus aplicaciones
Universidad del Rosario via edX
Intel® Edge AI for IoT Developers
Intel via Udacity