IoT Exploitation Kit - Demo Videos by Attify Security

IoT Exploitation Kit - Demo Videos

Overview

IoT Exploitation Kit - Demo Videos

What's included?

Video Icon 32 videos Text Icon 5 text files

Contents

Getting started
Intro to the kit
14 mins
Download Links to VM and Exercises
Hacking a Smart plug
Hacking a Smart Plug - Introduction
Orvibo Smart Plug Hacking
11 mins
(v1) Mobile app and Firmware analysis
2 mins
(v1) Cracking password of the smart plug
3 mins
(v1) Controlling Smart Plug
3 mins
SPI Exploitation
Open the device
Hardware Required
Dumping firmware from the IPCamera
3 mins
Reading and Writing to SPI Flash chips (For kits till mid-2020)
2 mins
Dumping Firmware using SPIFlash.py on WRTNode (2018 Edition)
8 mins
Hacking an IP Camera
UART Exploitation
UART Exploitation: Getting Shell access over Serial
4 mins
Cracking UART authentication
4 mins
v1: Exploiting IP Camera via UART
2 mins
JTAG Exploitation
Installing required packages
2 mins
Identifying JTAG pins with Arduino
2 mins
Identifying pins with JTAGulator
9 mins
Connections for JTAG
2 mins
Using Attify Badge Tool to perform JTAG debugging
2 mins
Connecting and Flashing vulnerable binary
3 mins
Reading Data from Target device
1 min
Dumping entire data from the target device
3 mins
Connections for the Final Exercise
2 mins
Manipulating target runtime over JTAG
7 mins
Software Defined Radio
Sending Data with 433 MHz and Arduino
2 mins
Identifying target frequency
1 min
Decoding 433 MHz data
3 mins
BLE Exploitation for IoT Devices
Getting started with ESP32 for BLE research
10 mins
Exploring BLE using ESP32
18 mins
Analyzing Beacon using BLE dongle
6 mins
Taking over Smart Bulb
4 mins
Taking over Smart Lock
4 mins
Analyzing BLE Smart Lock (OKLOK)
5 mins
Reverse Engineering and Frida analysis on OkLok
5 mins
Sniffing Zigbee traffic with Xbee
Sniffing Zigbee traffic with Xbee
4 mins

IoT Security and Exploitation

Learn how to break and secure IoT devices with this course. Topics to be covered: 

Firmware Reverse engineering 
Mobile and Web application analysis 
Embedded Device Exploitation
Software Defined Radio
BLE and ZigBee Exploitation