IoT Exploitation Kit - Demo Videos
by
Attify Security
Login
Buy for $1,297
badge.cfg
IoT Exploitation Kit - Demo Videos
/
JTAG Exploitation
This content is locked.
You'll need to
purchase
or
sign in
to view this content.
IoT Exploitation Kit - Demo Videos
Buy for $1,297
Learn more
Already enrolled?
Sign in to continue learning.
Table of contents
IoT Exploitation Kit - Demo Videos
by
Attify Security
ui-24px-outline-1_lock
Getting started
Getting started
Draft
Intro to the kit
Draft
Intro to the kit
Draft
Download Links to VM and Exercises
Draft
Download Links to VM and Exercises
ui-24px-outline-1_lock
Hacking a Smart plug
Hacking a Smart plug
Draft
Mobile app and Firmware analysis
Draft
Mobile app and Firmware analysis
Draft
Cracking password of the smart plug
Draft
Cracking password of the smart plug
Draft
Controlling Smart Plug
Draft
Controlling Smart Plug
Draft
Hacking a Smart Plug - 2019 (Orvibo S20C)
Draft
Hacking a Smart Plug - 2019 (Orvibo S20C)
Draft
Orvibo Smart Plug Hacking
Draft
Orvibo Smart Plug Hacking
ui-24px-outline-1_lock
Hacking an IP Camera
Hacking an IP Camera
Draft
Exploiting IP Camera via UART
Draft
Exploiting IP Camera via UART
ui-24px-outline-1_lock
SPI Exploitation
SPI Exploitation
Draft
SPI Target Equipment
Draft
SPI Target Equipment
Draft
Reading and Writing to SPI Flash chips
Draft
Reading and Writing to SPI Flash chips
Draft
Dumping Firmware using SPIFlash.py on WRTNode
Draft
Dumping Firmware using SPIFlash.py on WRTNode
ui-24px-outline-1_lock
JTAG Exploitation
JTAG Exploitation
Draft
Installing required packages
Draft
Installing required packages
Draft
Identifying JTAG pins with Arduino
Draft
Identifying JTAG pins with Arduino
Draft
Identifying pins with JTAGulator
Draft
Identifying pins with JTAGulator
Draft
Connections for JTAG
Draft
Connections for JTAG
Draft
Using Attify Badge Tool to perform JTAG debugging
Draft
Using Attify Badge Tool to perform JTAG debugging
Draft
Connecting and Flashing vulnerable binary
Draft
Connecting and Flashing vulnerable binary
Draft
VulnerableBinaryToFlash.bin
Draft
VulnerableBinaryToFlash.bin
Draft
stm32.cfg
Draft
stm32.cfg
Draft
Vulnerable-binary-for-gdb.elf
Draft
Vulnerable-binary-for-gdb.elf
Draft
badge.cfg
Draft
badge.cfg
Draft
Reading Data from Target device
Draft
Reading Data from Target device
Draft
Dumping entire data from the target device
Draft
Dumping entire data from the target device
Draft
Connections for the Final Exercise
Draft
Connections for the Final Exercise
Draft
Manipulating target runtime over JTAG
Draft
Manipulating target runtime over JTAG
ui-24px-outline-1_lock
Software Defined Radio
Software Defined Radio
Draft
Sending Data with 433 MHz and Arduino
Draft
Sending Data with 433 MHz and Arduino
Draft
Identifying target frequency
Draft
Identifying target frequency
Draft
Decoding 433 MHz data
Draft
Decoding 433 MHz data
ui-24px-outline-1_lock
BLE Exploitation for IoT Devices
BLE Exploitation for IoT Devices
Draft
Getting started with ESP32 for BLE research
Draft
Getting started with ESP32 for BLE research
Draft
Exploring BLE using ESP32
Draft
Exploring BLE using ESP32
Draft
Analyzing Beacon using BLE dongle
Draft
Analyzing Beacon using BLE dongle
Draft
Taking over Smart Bulb
Draft
Taking over Smart Bulb
Draft
Taking over Smart Lock
Draft
Taking over Smart Lock
Draft
Analyzing BLE Smart Lock (OKLOK)
Draft
Analyzing BLE Smart Lock (OKLOK)
Draft
Reverse Engineering and Frida analysis on OkLok
Draft
Reverse Engineering and Frida analysis on OkLok
ui-24px-outline-1_lock
Sniffing Zigbee traffic with Xbee
Sniffing Zigbee traffic with Xbee
Draft
Sniffing Zigbee traffic with Xbee
Draft
Sniffing Zigbee traffic with Xbee
Welcome!
Enter your info below to login.
Your email
Your password
Login
Forgot your password?