IoT Security for Pentesters
Buy now
Learn more
Introduction to IoT Security
Introduction
IoT 101
IoT Security Case Studies
Ninja Recon Technique
Firmware Analysis and Exploitation
Getting started with Firmware
Extracting file system from Firmware
Automated File System Extraction usin...
Hidden Certificates inside Firmware
Hardcoded Telnet Credentials inside F...
Additional Firmware analysis - passwo...
Reversing Binaries using Hopper
Working with Encrypted Firmware Binaries
Emulating IoT Firmware Binaries
Debugging Emulated Binaries
Full Firmware Emulation with FAT
Backdooring Firmware Binaries
Conventional Attack Techniques
Attacking Web Apps
Performing Command Injection
Diffing based vulnerabilities
Getting started with SmartPlug
Additional mobile application analysis
Reversing Encryption
Using Frida for App Analysis
Smart Plug Hacking
Orvibo Smart Plug Hacking
Native library analysis using Ghidra
Binary Exploitation for IoT Devices
Intro to Binary Exploitation & ARM
ARM Instruction Sets and Addressing M...
Using GDB to analyze ARM Binaries
ARM Mode and Thumb Mode
Manipulating Program Execution
Reversing Binary and Understanding Di...
ROP Based Exploitation for ARM
ARM Exploitation on Real World Firmware
Writing Shellcodes for ARM
Binary Exploitation on MIPS - A Short...
Hardware/Embedded Hacking for IoT Devices
Introduction to Hardware Hacking
Analyzing Circuit Boards (PCB Recon)
PCB Reconnaissance Continued
Performing Pin Tracing (Analyzing Tra...
Serial Communication Interfaces and I...
Exploiting an IP Camera
NAND Glitching
Introduction to JTAG
Identifying JTAG pinouts with Arduino...
Using JTAGulator to identify JTAG pin...
Connections for JTAG
JTAG Debugging with Attify Badge
Flashing new firmware using JTAG
Reading Memory Contents using JTAG
Dumping data using JTAG
Connections for the Final Exercise
JTAG Authentication Bypass Walkthrough
Serial Peripheral Interface (SPI) Com...
SPI Flash Firmware Dumping
Logic and Bus Sniffing
Software Defined Radio and Radio Communications for IoT
Introduction to Software Defined Radi...
Common Radio Terminologies
Getting Started With RTL-SDR
Working with GNURadio
Sending Data with a 433 MHz transmitter
Identifying Exact frequency using GQRX
Decoding a 433 MHz signal
Bluetooth Low Energy (BLE)
Introduction to Bluetooth Low Energy
BLE Device Recon
Analyzing a BLE device
Getting started with ESP32 for BLE Se...
Exploring BLE using ESP32
Sniffing BLE using Adafruit Sniffer
Sniffing BLE using Ubertooth sniffer
Exploiting a BLE Smart Lock
Getting started with BLE Smart Lock (...
Reverse Engineering OKLOK with JADx a...
Smartlock BLE Traffic Capture and Ana...
Understanding the Smart Lock Logic
Smartlock Unlock Script and Mechanism
Zigbee
Introduction to ZigBee and Lab Setup
Sniffing and Dumping ZigBee packets
[DEMO] Attify Zigbee Framework - Snif...
Products
Course
Section
Lesson
Manipulating Program Execution
Manipulating Program Execution
IoT Security for Pentesters
Buy now
Learn more
Introduction to IoT Security
Introduction
IoT 101
IoT Security Case Studies
Ninja Recon Technique
Firmware Analysis and Exploitation
Getting started with Firmware
Extracting file system from Firmware
Automated File System Extraction usin...
Hidden Certificates inside Firmware
Hardcoded Telnet Credentials inside F...
Additional Firmware analysis - passwo...
Reversing Binaries using Hopper
Working with Encrypted Firmware Binaries
Emulating IoT Firmware Binaries
Debugging Emulated Binaries
Full Firmware Emulation with FAT
Backdooring Firmware Binaries
Conventional Attack Techniques
Attacking Web Apps
Performing Command Injection
Diffing based vulnerabilities
Getting started with SmartPlug
Additional mobile application analysis
Reversing Encryption
Using Frida for App Analysis
Smart Plug Hacking
Orvibo Smart Plug Hacking
Native library analysis using Ghidra
Binary Exploitation for IoT Devices
Intro to Binary Exploitation & ARM
ARM Instruction Sets and Addressing M...
Using GDB to analyze ARM Binaries
ARM Mode and Thumb Mode
Manipulating Program Execution
Reversing Binary and Understanding Di...
ROP Based Exploitation for ARM
ARM Exploitation on Real World Firmware
Writing Shellcodes for ARM
Binary Exploitation on MIPS - A Short...
Hardware/Embedded Hacking for IoT Devices
Introduction to Hardware Hacking
Analyzing Circuit Boards (PCB Recon)
PCB Reconnaissance Continued
Performing Pin Tracing (Analyzing Tra...
Serial Communication Interfaces and I...
Exploiting an IP Camera
NAND Glitching
Introduction to JTAG
Identifying JTAG pinouts with Arduino...
Using JTAGulator to identify JTAG pin...
Connections for JTAG
JTAG Debugging with Attify Badge
Flashing new firmware using JTAG
Reading Memory Contents using JTAG
Dumping data using JTAG
Connections for the Final Exercise
JTAG Authentication Bypass Walkthrough
Serial Peripheral Interface (SPI) Com...
SPI Flash Firmware Dumping
Logic and Bus Sniffing
Software Defined Radio and Radio Communications for IoT
Introduction to Software Defined Radi...
Common Radio Terminologies
Getting Started With RTL-SDR
Working with GNURadio
Sending Data with a 433 MHz transmitter
Identifying Exact frequency using GQRX
Decoding a 433 MHz signal
Bluetooth Low Energy (BLE)
Introduction to Bluetooth Low Energy
BLE Device Recon
Analyzing a BLE device
Getting started with ESP32 for BLE Se...
Exploring BLE using ESP32
Sniffing BLE using Adafruit Sniffer
Sniffing BLE using Ubertooth sniffer
Exploiting a BLE Smart Lock
Getting started with BLE Smart Lock (...
Reverse Engineering OKLOK with JADx a...
Smartlock BLE Traffic Capture and Ana...
Understanding the Smart Lock Logic
Smartlock Unlock Script and Mechanism
Zigbee
Introduction to ZigBee and Lab Setup
Sniffing and Dumping ZigBee packets
[DEMO] Attify Zigbee Framework - Snif...
Lesson unavailable
Please
login to your account
or
buy the course
.