Book Image

Hands-On IoT Penetration Testing [Video]

By : Sunil Gupta
Book Image

Hands-On IoT Penetration Testing [Video]

By: Sunil Gupta

Overview of this book

<p>Pentesting is much like taking a battering ram to the door of a fortress. You keep pounding away but try to find a secret backdoor to enter through. But what happens if pieces of the network are outside the fortress? The solution to this problem is IOT pentesting. <br />This course begins with the IoT device architecture to help you understand the most common vulnerabilities. You'll explore networks, sniffing out vulnerabilities while also ensuring that the hardware devices and the software running on them are free of any security loopholes.<br />Moving on, you will learn how to perform pentesting on advanced IoT Devices including Amazon Eco, Logitech Cameras, the Google Nexus phone, Vyos Gateways, TP-Link Smart Switches, and firewalls. By the end of the course, you will be able to create IoT pentesting reports. After completion of the course, you will be able to penetrate even the most densely populated IoT networks.</p> <h1>Style and Approach</h1> <p>To satisfy market demands, this course is designed to enhance the skills of professionals working in IoT Pentesting. We realize the importance of the student's time and goals and emphasized on the practicality of the subject</p>
Table of Contents (8 chapters)
Chapter 5
Google Wireless IoT Device Pentesting
Content Locked
Section 4
Hack Other IoT Devices in the Network
In this video, you will learn about the process to attack on other IoT devices. - About network and devices - Process to attack on various IoT devices - Explanation about hacking other IoT devices in the network