Book Image

Intro to IoT Pentesting [Video]

By : ACI Learning, Daniel Lowrie, Sophie Goodwin
Book Image

Intro to IoT Pentesting [Video]

By: ACI Learning, Daniel Lowrie, Sophie Goodwin

Overview of this book

The course begins by introducing you to the world of IoT and its significance in today's tech-driven society, emphasizing the importance of security in this interconnected environment. It covers the spectrum of IoT targets and the necessity of robust security measures to protect them. The course focuses on practical skills, including the use of hardware components like multimeters, TTL to USB, and JTAGulators, as well as software tools such as terminal emulators, Binwalk, and QEMU. You will learn about firmware analysis, including acquisition, extraction, and emulation, alongside techniques for exploiting embedded operating systems, network services, and IoT web applications. The course wraps up by guiding you through hands-on practices for identifying hardware vulnerabilities, automating UART pin identification, and gaining device access, ensuring you have the knowledge to perform comprehensive pentests on IoT devices.
Table of Contents (6 chapters)
Chapter 1
IoT Basics
Content Locked
Section 4
Hardware Components
One of the ways we can attack an IoT device is by exploring its hardware and looking for potentially exploitable vulnerabilities or access points. In this episode, we will take a moment to familiarize ourselves with hardware components that are commonly found in today's IoT devices.