01-Introduction to IoT Security
02-Mapping Attack surface and previous vulnerabilities
03-Firmware analysis – Identifying hardcoded secrets
04-Emulating firmware binary
05-Backdooring a firmware – 1
09-Using Burp for IoT Web app security
10-Exploiting Command Injection – Part 1
12-CSRF and...