только у нас скачать шаблон dle скачивать рекомендуем

Фото видео монтаж » Видео уроки » Practical Iot Security And Penetration Testing For Beginners

Practical Iot Security And Penetration Testing For Beginners

Practical Iot Security And Penetration Testing For Beginners

Practical Iot Security And Penetration Testing For Beginners
Published 4/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English

| Size: 1.35 GB[/center]
| Duration: 2h 9m
Learn the Basics of IoT security and jump into practical penetration testing of IoT devices

What you'll learn

Learn about Basics of IoT devices, architecture and Common IoT vulnerabilities

Utilize tools and techniques for firmware extraction.

Analyze extracted firmware for vulnerabilities and functionalities.

Emulating a firmware for dynamic analysis of IoT devices

Learn to Backdoor a firmware

Analyze vulnerabilities present in Modbus implementations.

Learn Modbus fundamentals, its weaknesses and how to exploit it

Requirements

Basic Hands-on experience with Kali Linux is recommended

Description

Dive into the world of IoT security! This beginner-friendly course equips you with the foundational knowledge of vulnerabilities in connected devices. Learn how to identify threats, understand penetration testing methodologies, and gain hands-on experience through practical exercises. No prior experience is required on IoT devices - just a passion for protecting the interconnected future!Section 1: Demystifying the Internet of Things (IoT)IoT Fundamentals 101: Grasp the core concepts - components, communication protocols, real-world applications.Unveiling the Architecture: Deep dive into the layers and data flow within IoT systems.Securing the Frontier: Master common IoT vulnerabilities and the consequences of security breaches.Section 2: Cracking the Code: Firmware Analysis and ManipulationFirmware Extraction Mastery: Unlock the secrets within devices using industry-standard tools and techniques.Firmware Forensics: Analyze extracted firmware to identify vulnerabilities, functionalities, and valuable information.Emulation Engineering: Create safe simulated environments for testing attacks on IoT devices.Advanced Backdooring (Educational Only): Understand the concept of backdooring router and learn to backdoor a real-world WIFI router.Section 3: Attacking IoT Protocols: MQTT and Modbus for BeginnersMQTT for Beginners: Master the Message Queueing Telemetry Transport protocol and its potential security weaknesses.Modbus Mastery: Unlock the secrets of the Modbus protocol used in industrial control systems and identify vulnerabilities.Penetration Testing Prowess: Gain hands-on experience with industry-standard tools and techniques to ethically exploit vulnerabilities and test the security of IoT networks exploiting MQTT and Modbus protocols (Note: Techniques covered for educational purposes only.)This comprehensive course equips you with the knowledge and skills to become a sought-after expert in securing the ever-expanding world of the Internet of Things.

Overview

Section 1: Introduction

Lecture 1 Introduction to the Course

Section 2: Master The Basics

Lecture 2 Introduction to Internet of Things

Lecture 3 IoT Components and Architecture

Lecture 4 IoT Threat Spectrum

Section 3: Pentesting IoT Devices

Lecture 5 OSINT for IoT - Reconnaissance

Lecture 6 Setting up IoT Goat and Kali Linux on Virtual Box

Lecture 7 Scanning for Vulnerable Network Services in IoT devices

Lecture 8 Exploiting Backdoor in IoT Goat

Lecture 9 Brute forcing IoT Devices

Lecture 10 Web interface Vulnerabilities - XSS

Lecture 11 Firmware Testing Methodology

Lecture 12 Extracting Firmware and Retrieving Sensitive Information

Lecture 13 Find Hidden Web Pages - Firmware Analysis

Lecture 14 Analyzing a Real-World IoT Firmware

Section 4: Advanced IoT Pentesting

Lecture 15 Install Attify OS

Lecture 16 Analyzing Firmware on Attify OS

Lecture 17 Emulating a Firmware with Firmware Analysis Toolkit

Lecture 18 Exploiting Blind Remote Code Execution

Lecture 19 Backdooring a Firmware

Section 5: Analysing Application Layer Protocols

Lecture 20 Analyzing MQTT Traffic

Lecture 21 Command Injection through MQTT - Bugged Try Hack Me

Lecture 22 Attacking ModBus - Hacking SCADA Systems

Section 6: Bonus Section

Lecture 23 Bonus Lecture

Cyber Security Professionals interested in IoT and OT security and Hacking,Penetration testers looking to improve their skill set,Professionals seeking the comprehensive technical skills needed to understand, analyze, attack, and defend the entire spectrum of the IoT ecosystem






Free search engine download: Practical IoT Security and Penetration testing for Beginners
Poproshajka




Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.