только у нас скачать шаблон dle скачивать рекомендуем

Iot Pentest

Iot Pentest

Iot Pentest

Published 6/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.24 GB | Duration: 1h 54m


Hacking IoT Devices and Understanding their Security Aspects

What you'll learn
Soldering Basics
Hardware Hacking
Using a Multimeter
UART, JTAG, SPIF Interfaces
Firmware Analysis
Binwalk
Software Defined Radio
Analyzing Radio Signals
BLE Hacking
Zigbee Hacking

Requirements
Basic Penetration Testing concepts and Linux Operating Systems

Description
The IoT Pentes course will familiarize you with standard interfaces in IoT devices and recommend a process along with the Threat Model to evaluate these devices within many layers of the Open Systems Interconnection (OSI) model. From firmware and network protocol analysis to hardware implementation issues and application flaws, we will give you the tools and hands-on techniques to evaluate the ever-expanding range of IoT devices. The course approach facilitates examining the IoT ecosystem across many different verticals, from automotive technology to healthcare, manufacturing, and industrial control systems. The methodology is the same in all cases, but the risk model is different.The course is efficient, with labs on all modules and a challenge that you offer so you can try to hack a specific device and the solution.You will learn the following:Soldering BasicsHardware HackingUsing a MultimeterUART, JTAG, SPIF InterfacesFirmware AnalysisBinwalkSoftware Defined RadioAnalysing Radio SignalsBLE HackingZigbee HackingAnd more!After finishing this course, you will have a good understanding of IoT security, how to exploit and secure those devices, follow a methodology to approach other devices, and get ready to explore by yourself. Join us in this course, and let's hack the planet!

Overview
Section 1: IoT Pentest Introduction

Lecture 1 Introduction

Section 2: Your Hacking IoT Arsenal

Lecture 2 What You Should Know

Lecture 3 OS Used for Hacking IoT devices

Lecture 4 Hardware & Tools

Lecture 5 Software & Applications

Lecture 6 BOM & Shopping List Used on this Course

Section 3: Hardware Hacking

Lecture 7 Soldering Basics

Lecture 8 How to Use a Multimeter

Lecture 9 FCC and Datasheets are Your Friends

Lecture 10 Detecting Pinout of UART Interfaces

Lecture 11 Detecting Pinout of JTAG Interfaces

Lecture 12 Extracting Firmware from SPI Interface

Lecture 13 Hardware Hacking Challenge

Lecture 14 Hardware Challenge Solution

Section 4: Firmware Analysis

Lecture 15 Introduction to Firmware Analysis

Lecture 16 Binwalk and File Systems

Lecture 17 Finding Firmware Vulnerabilities

Lecture 18 Firmware Analysis Automation

Lecture 19 Firmware Hacking Challenge

Lecture 20 Firmware Challenge Solution

Section 5: Software Defined Radio

Lecture 21 Introduction to SDR

Lecture 22 Setting Up your SDR Lab

Lecture 23 Analyzing Radio Signals

Lecture 24 SDR Hacking Challenge

Lecture 25 SDR Hacking Solution

Section 6: 5. Hacking BLE

Lecture 26 Introduction to BLE

Lecture 27 Discovering and Interacting with BLE Devices

Lecture 28 BLE Hacking Challenge

Lecture 29 Ble Challenge Solution

Section 7: Hacking Zigbee

Lecture 30 Introduction to Zigbee

Lecture 31 Setting Up your Zigbee Lab

Lecture 32 Analyzing Zigbee Traffic

Lecture 33 Zigbee Hacking Challenge

Lecture 34 Zigbee Challenge Solution

Section 8: Wrap-up

Lecture 35 The End

This course is for IoT product managers, software and systems engineering managers, IT security professionals, IoT developers, penetration testers, and security professionals who are willing to learn IoT security


HOMEPAGE


  https://www.udemy.com/course/iot-pentest/ 


DOWNLOAD


https://rapidgator.net/file/466b933b6f32c165e889a723b3dde4eb/IoT_Pentest.part1.rar.html
https://rapidgator.net/file/60dd5c2f10b89e4cceb4491a082a7e6a/IoT_Pentest.part2.rar.html


https://uploadgig.com/file/download/50Be7191ac48279D/IoT_Pentest.part1.rar
https://uploadgig.com/file/download/B54772859a731124/IoT_Pentest.part2.rar
Poproshajka




Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.