Companies Home Search Profile

Offensive Internet of Things (IoT) Exploitation

Focused View

7:35:02

169 View
  • 001-Introduction to IoT Security.mp4
    09:22
  • 002-Mapping Attack surface and previous vulnerabilities.mp4
    09:46
  • 002-b-Setting up your IoT pentesting VM.pdf
  • 002-b-Setting up your IoT pentesting VM .mp4
    09:24
  • 003-Firmware analysis - Identifying hardcoded secrets.mp4
    05:59
  • 003-a-Firmware Analysis 101.mp4
    15:33
  • 004-Emulating firmware binary.mp4
    08:47
  • 005-Backdooring a firmware - 1 .mp4
    07:23
  • 006-Backdooring a firmware - 2.mp4
    12:21
  • 007-Firmware Emulation using FAT.mp4
    07:25
  • 008-Web application security for IoT devices.mp4
    08:22
  • 009-Using Burp for IoT Web app security.mp4
    06:18
  • 010-Exploiting Command Injection - Part 1.mp4
    05:26
  • 011-Exploiting Command Injection - Part 2.mp4
    05:59
  • 012-CSRF and Firmware diffing.mp4
    08:06
  • 013-Conventional Attack vectors .mp4
    07:23
  • 014-Conventional attack vectors - Password cracking.mp4
    05:58
  • 015-Analysing Smart Plug - Getting started.mp4
    08:26
  • 016-Reversing Smart plug encryption.mp4
    12:00
  • 017-Controlling Smart Plug.mp4
    09:17
  • 018-Getting started with ARM.mp4
    21:00
  • 019-Buffer overflow on ARM .mp4
    09:11
  • 020-Exploit Development on ARM.mp4
    11:53
  • 021-Using Radare2 for MIPS binary analysis.mp4
    14:22
  • 022-Exploitation using GDB remote debugging on MIPS.mp4
    13:19
  • 023-Introduction to Serial Interfacing and UART.mp4
    14:34
  • 024-Serial interfacing over UART .mp4
    06:54
  • 025-NAND Glitching.mp4
    07:30
  • 026-SPI and I2C - Introduction and Dumping data.mp4
    12:16
  • 027-Writing and Reading EEPROM using Arduino.mp4
    04:34
  • 028-Introduction to JTAG.mp4
    07:37
  • 029-Identifying JTAG pinouts using Arduino.mp4
    09:21
  • 030-JTAGulator.mp4
    08:19
  • 031-Debugging with JTAG.mp4
    13:04
  • 032-Introduction to SDR.mp4
    15:15
  • 033-Getting started with GNU Radio companion.mp4
    09:15
  • 034-Decoding captured AM Signal.mp4
    04:10
  • 035-Capturing FM signals using RTL-SDR.mp4
    06:59
  • 036-Analysing wireless doorbells using RTL-SDR.mp4
    06:52
  • 037-Extracting text from signal.mp4
    10:04
  • 038-Extracting text from Signal - part 2 (using Audacity) .mp4
    09:04
  • 039-a-Introduction to BLE.mp4
    10:26
  • 039-b-BLE Cracking and Pairing modes.mp4
    15:52
  • 040-Sniffing BLE using Ubertooth.mp4
    10:33
  • 041-Introduction to Zigbee and Sniffing.mp4
    13:01
  • 042-a-Zigbee Exploitation - part one .mp4
    14:34
  • 042-b-Zigbee Exploitation - Part 2.mp4
    11:48
  • Offensive IoT Exploitation - SecurityTube.pdf
  • allsubtitles.zip
  • exercisefiles.zip
  • filelist.txt
  • results.zip
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Founded in 2011 by world-renowned security researcher and trainer, Vivek Ramachandran, Pentester Academy is the world's leading cybersecurity skills ...
    • language english
    • Training sessions 46
    • duration 7:35:02
    • Release Date 2023/06/15