Taking Over the World Through MQTT - Aftermath
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the aftermath of MQTT protocol vulnerabilities in this 40-minute Black Hat conference talk. Delve into the findings from a custom-built endpoint testing tool, examining how protocol data is often stored in SQL databases and the resulting security implications. Analyze the current state of MQTT security, comparing it to the situation from over a year ago. Discover newly identified vulnerable devices and learn about the global response to these security concerns. Gain insights into SQL and server attacks facilitated through the MQTT protocol, and understand the evolving landscape of IoT security threats.
Syllabus
Taking Over the World Through MQTT - Aftermath
Taught by
Black Hat
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network