Iot Pentest
Published 6/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.24 GB | Duration: 1h 54m
What you'll learn Soldering Basics Hardware Hacking Using a Multimeter UART, JTAG, SPIF Interfaces Firmware Analysis Binwalk Software Defined Radio Analyzing Radio Signals BLE Hacking Zigbee Hacking Requirements Basic Penetration Testing concepts and Linux Operating Systems Description The IoT Pentes course will familiarize you with standard interfaces in IoT devices and recommend a process along with the Threat Model to evaluate these devices within many layers of the Open Systems Interconnection (OSI) model. From firmware and network protocol analysis to hardware implementation issues and application flaws, we will give you the tools and hands-on techniques to evaluate the ever-expanding range of IoT devices. The course approach facilitates examining the IoT ecosystem across many different verticals, from automotive technology to healthcare, manufacturing, and industrial control systems. The methodology is the same in all cases, but the risk model is different.The course is efficient, with labs on all modules and a challenge that you offer so you can try to hack a specific device and the solution.You will learn the following:Soldering BasicsHardware HackingUsing a MultimeterUART, JTAG, SPIF InterfacesFirmware AnalysisBinwalkSoftware Defined RadioAnalysing Radio SignalsBLE HackingZigbee HackingAnd more!After finishing this course, you will have a good understanding of IoT security, how to exploit and secure those devices, follow a methodology to approach other devices, and get ready to explore by yourself. Join us in this course, and let's hack the planet! Overview Section 1: IoT Pentest Introduction Lecture 1 Introduction Section 2: Your Hacking IoT Arsenal Lecture 2 What You Should Know Lecture 3 OS Used for Hacking IoT devices Lecture 4 Hardware & Tools Lecture 5 Software & Applications Lecture 6 BOM & Shopping List Used on this Course Section 3: Hardware Hacking Lecture 7 Soldering Basics Lecture 8 How to Use a Multimeter Lecture 9 FCC and Datasheets are Your Friends Lecture 10 Detecting Pinout of UART Interfaces Lecture 11 Detecting Pinout of JTAG Interfaces Lecture 12 Extracting Firmware from SPI Interface Lecture 13 Hardware Hacking Challenge Lecture 14 Hardware Challenge Solution Section 4: Firmware Analysis Lecture 15 Introduction to Firmware Analysis Lecture 16 Binwalk and File Systems Lecture 17 Finding Firmware Vulnerabilities Lecture 18 Firmware Analysis Automation Lecture 19 Firmware Hacking Challenge Lecture 20 Firmware Challenge Solution Section 5: Software Defined Radio Lecture 21 Introduction to SDR Lecture 22 Setting Up your SDR Lab Lecture 23 Analyzing Radio Signals Lecture 24 SDR Hacking Challenge Lecture 25 SDR Hacking Solution Section 6: 5. Hacking BLE Lecture 26 Introduction to BLE Lecture 27 Discovering and Interacting with BLE Devices Lecture 28 BLE Hacking Challenge Lecture 29 Ble Challenge Solution Section 7: Hacking Zigbee Lecture 30 Introduction to Zigbee Lecture 31 Setting Up your Zigbee Lab Lecture 32 Analyzing Zigbee Traffic Lecture 33 Zigbee Hacking Challenge Lecture 34 Zigbee Challenge Solution Section 8: Wrap-up Lecture 35 The End This course is for IoT product managers, software and systems engineering managers, IT security professionals, IoT developers, penetration testers, and security professionals who are willing to learn IoT security
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.