IoT Security for Pentesters by Attify Security

IoT Security for Pentesters

A Step-By-Step Guide to Learning Practical and Hands-on Internet of Things (IoT) Pentesting and Exploitation

What's included?

Video Icon 70 videos File Icon 1 file

Contents

Introduction to IoT Security
Introduction to the training course
6 mins
What is Internet of Things
8 mins
Previous IoT Security issues
8 mins
Introduction to the Virtual Machine
2 mins
Firmware Analysis and Exploitation
Getting started with Firmware
24 mins
Extracting file system from Firmware
11 mins
Automated File System Extraction using Binwalk
9 mins
Hidden Certificates inside Firmware
6 mins
Hardcoded Telnet Credentials inside Firmware
8 mins
Additional Firmware analysis - password protected firmware
12 mins
Reversing Binaries using Hopper
7 mins
Working with Encrypted Firmware Binaries
9 mins
Emulating IoT Firmware Binaries
11 mins
Debugging Emulated Binaries
9 mins
Full Firmware Emulation with FAT
14 mins
Backdooring Firmware Binaries
22 mins
Conventional Attack Techniques
Attacking Web Apps
10 mins
Performing Command Injection
13 mins
Diffing based vulnerabilities
10 mins
Getting started with SmartPlug
11 mins
Additional mobile application analysis
16 mins
Reversing Encryption
11 mins
Using Frida for App Analysis
9 mins
Smart Plug Hacking
11 mins
Orvibo Smart Plug Hacking
11 mins
Binary Exploitation for IoT Devices
Intro to Binary Exploitation & ARM
11 mins
Reversing Binary and Understanding Disassembly
11 mins
ARM Instruction Sets and Addressing Modes
11 mins
Using GDB to analyze ARM Binaries
17 mins
ARM Mode and Thumb Mode
15 mins
Manipulating Program Execution
15 mins
ROP Based Exploitation for ARM
26 mins
ARM Exploitation on Real World Firmware
14 mins
Writing Shellcodes for ARM
18 mins
Binary Exploitation on MIPS - A Short Overview
11 mins
Hardware/Embedded Hacking for IoT Devices
Introduction to Hardware Hacking
14 mins
Analyzing Circuit Boards (PCB Recon)
14 mins
PCB Reconnaissance Continued
12 mins
Performing Pin Tracing (Analyzing Tracks)
12 mins
Serial Communication Interfaces and Introduction to UART
10 mins
Exploiting an IP Camera
2 mins
NAND Glitching
5 mins
Introduction to JTAG
13 mins
Identifying JTAG pinouts with Arduino Nano and JTAGEnum
2 mins
Using JTAGulator to identify JTAG pinouts
9 mins
Connections for JTAG
2 mins
JTAG Debugging with Attify Badge.mov
2 mins
Flashing new firmware using JTAG
3 mins
Reading Memory Contents using JTAG
1 min
Dumping data using JTAG
3 mins
Connections for the Final Exercise
2 mins
JTAG Authentication Bypass Walkthrough
7 mins
Serial Peripheral Interface (SPI) Communication
7 mins
SPI Flash Firmware Dumping
4 mins
Logic and Bus Sniffing
8 mins
Software Defined Radio and Radio Communications for IoT
Introduction to Software Defined Radio (SDR)
7 mins
Common Radio Terminologies
10 mins
Getting Started With RTL-SDR
8 mins
Working with GNURadio
11 mins
Sending Data with a 433 MHz transmitter
2 mins
Identifying Exact frequency using GQRX
1 min
Decoding a 433 MHz signal
3 mins
Introduction to Bluetooth Low Energy
5 mins
BLE Device Recon
9 mins
Analyzing a BLE device
9 mins
Sniffing BLE using Adafruit Sniffer
4 mins
Sniffing BLE using Ubertooth sniffer
7 mins
Exploiting a BLE Smart Lock
11 mins
Introduction to ZigBee and Lab Setup
12 mins
Sniffing and Dumping ZigBee packets
4 mins
[DEMO] Attify Zigbee Framework - Sniff, Replay and Exploit ZigBee traffic in IoT devices

IoT Security and Exploitation

Learn how to break and secure IoT devices with this course. Topics to be covered: 

Firmware Reverse engineering 
Mobile and Web application analysis 
Embedded Device Exploitation
Software Defined Radio
BLE and ZigBee Exploitation