IoT Exploitation Kit - Demo Videos
by
Attify Security
Login
Buy for $1,297
Analyzing BLE Smart Lock (OKLOK)
IoT Exploitation Kit - Demo Videos
/
BLE Exploitation for IoT Devices
This content is locked.
You'll need to
purchase
or
sign in
to view this content.
IoT Exploitation Kit - Demo Videos
Buy for $1,297
Learn more
Already enrolled?
Sign in to continue learning.
Table of contents
IoT Exploitation Kit - Demo Videos
by
Attify Security
ui-24px-outline-1_lock
Getting started
Getting started
Draft
Intro to the kit
Draft
Intro to the kit
Draft
Download Links to VM and Exercises
Draft
Download Links to VM and Exercises
ui-24px-outline-1_lock
Hacking a Smart plug
Hacking a Smart plug
Draft
Hacking a Smart Plug - Introduction
Draft
Hacking a Smart Plug - Introduction
Draft
Orvibo Smart Plug Hacking
Draft
Orvibo Smart Plug Hacking
Draft
(v1) Mobile app and Firmware analysis
Draft
(v1) Mobile app and Firmware analysis
Draft
(v1) Cracking password of the smart plug
Draft
(v1) Cracking password of the smart plug
Draft
(v1) Controlling Smart Plug
Draft
(v1) Controlling Smart Plug
ui-24px-outline-1_lock
SPI Exploitation
SPI Exploitation
Draft
Open the device
Draft
Open the device
Draft
Hardware Required
Draft
Hardware Required
Draft
Dumping firmware from the IPCamera
Draft
Dumping firmware from the IPCamera
Draft
Reading and Writing to SPI Flash chips (For kits till mid-2020)
Draft
Reading and Writing to SPI Flash chips (For kits till mid-2020)
Draft
Dumping Firmware using SPIFlash.py on WRTNode (2018 Edition)
Draft
Dumping Firmware using SPIFlash.py on WRTNode (2018 Edition)
ui-24px-outline-1_lock
Hacking an IP Camera
Hacking an IP Camera
Draft
UART Exploitation
Draft
UART Exploitation
Draft
UART Exploitation: Getting Shell access over Serial
Draft
UART Exploitation: Getting Shell access over Serial
Draft
Cracking UART authentication
Draft
Cracking UART authentication
Draft
v1: Exploiting IP Camera via UART
Draft
v1: Exploiting IP Camera via UART
ui-24px-outline-1_lock
JTAG Exploitation
JTAG Exploitation
Draft
Installing required packages
Draft
Installing required packages
Draft
Identifying JTAG pins with Arduino
Draft
Identifying JTAG pins with Arduino
Draft
Identifying pins with JTAGulator
Draft
Identifying pins with JTAGulator
Draft
Connections for JTAG
Draft
Connections for JTAG
Draft
Using Attify Badge Tool to perform JTAG debugging
Draft
Using Attify Badge Tool to perform JTAG debugging
Draft
Connecting and Flashing vulnerable binary
Draft
Connecting and Flashing vulnerable binary
Draft
Reading Data from Target device
Draft
Reading Data from Target device
Draft
Dumping entire data from the target device
Draft
Dumping entire data from the target device
Draft
Connections for the Final Exercise
Draft
Connections for the Final Exercise
Draft
Manipulating target runtime over JTAG
Draft
Manipulating target runtime over JTAG
ui-24px-outline-1_lock
Software Defined Radio
Software Defined Radio
Draft
Sending Data with 433 MHz and Arduino
Draft
Sending Data with 433 MHz and Arduino
Draft
Identifying target frequency
Draft
Identifying target frequency
Draft
Decoding 433 MHz data
Draft
Decoding 433 MHz data
ui-24px-outline-1_lock
BLE Exploitation for IoT Devices
BLE Exploitation for IoT Devices
Draft
Getting started with ESP32 for BLE research
Draft
Getting started with ESP32 for BLE research
Draft
Exploring BLE using ESP32
Draft
Exploring BLE using ESP32
Draft
Analyzing Beacon using BLE dongle
Draft
Analyzing Beacon using BLE dongle
Draft
Taking over Smart Bulb
Draft
Taking over Smart Bulb
Draft
Taking over Smart Lock
Draft
Taking over Smart Lock
Draft
Analyzing BLE Smart Lock (OKLOK)
Draft
Analyzing BLE Smart Lock (OKLOK)
Draft
Reverse Engineering and Frida analysis on OkLok
Draft
Reverse Engineering and Frida analysis on OkLok
ui-24px-outline-1_lock
Sniffing Zigbee traffic with Xbee
Sniffing Zigbee traffic with Xbee
Draft
Sniffing Zigbee traffic with Xbee
Draft
Sniffing Zigbee traffic with Xbee
Welcome!
Enter your info below to login.
Your email
Your password
Login
Forgot your password?