Offensive Internet of Things (IoT) Exploitation
Focused View
7:35:02
169 View
001-Introduction to IoT Security.mp4
09:22
002-Mapping Attack surface and previous vulnerabilities.mp4
09:46
002-b-Setting up your IoT pentesting VM .mp4
09:24
003-Firmware analysis - Identifying hardcoded secrets.mp4
05:59
003-a-Firmware Analysis 101.mp4
15:33
004-Emulating firmware binary.mp4
08:47
005-Backdooring a firmware - 1 .mp4
07:23
006-Backdooring a firmware - 2.mp4
12:21
007-Firmware Emulation using FAT.mp4
07:25
008-Web application security for IoT devices.mp4
08:22
009-Using Burp for IoT Web app security.mp4
06:18
010-Exploiting Command Injection - Part 1.mp4
05:26
011-Exploiting Command Injection - Part 2.mp4
05:59
012-CSRF and Firmware diffing.mp4
08:06
013-Conventional Attack vectors .mp4
07:23
014-Conventional attack vectors - Password cracking.mp4
05:58
015-Analysing Smart Plug - Getting started.mp4
08:26
016-Reversing Smart plug encryption.mp4
12:00
017-Controlling Smart Plug.mp4
09:17
018-Getting started with ARM.mp4
21:00
019-Buffer overflow on ARM .mp4
09:11
020-Exploit Development on ARM.mp4
11:53
021-Using Radare2 for MIPS binary analysis.mp4
14:22
022-Exploitation using GDB remote debugging on MIPS.mp4
13:19
023-Introduction to Serial Interfacing and UART.mp4
14:34
024-Serial interfacing over UART .mp4
06:54
025-NAND Glitching.mp4
07:30
026-SPI and I2C - Introduction and Dumping data.mp4
12:16
027-Writing and Reading EEPROM using Arduino.mp4
04:34
028-Introduction to JTAG.mp4
07:37
029-Identifying JTAG pinouts using Arduino.mp4
09:21
030-JTAGulator.mp4
08:19
031-Debugging with JTAG.mp4
13:04
032-Introduction to SDR.mp4
15:15
033-Getting started with GNU Radio companion.mp4
09:15
034-Decoding captured AM Signal.mp4
04:10
035-Capturing FM signals using RTL-SDR.mp4
06:59
036-Analysing wireless doorbells using RTL-SDR.mp4
06:52
037-Extracting text from signal.mp4
10:04
038-Extracting text from Signal - part 2 (using Audacity) .mp4
09:04
039-a-Introduction to BLE.mp4
10:26
039-b-BLE Cracking and Pairing modes.mp4
15:52
040-Sniffing BLE using Ubertooth.mp4
10:33
041-Introduction to Zigbee and Sniffing.mp4
13:01
042-a-Zigbee Exploitation - part one .mp4
14:34
042-b-Zigbee Exploitation - Part 2.mp4
11:48
More details
User Reviews
Rating
average 0
Focused display

Pentester Academy
View courses Pentester AcademyFounded in 2011 by world-renowned security researcher and trainer, Vivek Ramachandran, Pentester Academy is the world's leading cybersecurity skills ...
- language english
- Training sessions 46
- duration 7:35:02
- Release Date 2023/06/15