Pentester Academy – Offensive Internet of Things IoT Exploitation

protectaccount

protectaccount

Hero Member
Joined
December 27, 2025
Messages
694
Reaction score
1,005
Points
93
qxwTsMJ.png

01-Introduction to IoT Security
02-Mapping Attack surface and previous vulnerabilities
03-Firmware analysis – Identifying hardcoded secrets
04-Emulating firmware binary
05-Backdooring a firmware – 1
09-Using Burp for IoT Web app security
10-Exploiting Command Injection – Part 1
12-CSRF and Firmware diffing
13-Conventional Attack vectors
14-Conventional attack vectors – Password cracking
15-Analysing Smart Plug – Getting started
17-Controlling Smart Plug
18-Getting started with ARM
19-Buffer overflow on ARM
20-Exploit Development on ARM
21-Using Radare2 for MIPS binary analysis
22-Exploitation using GDB remote debugging on MIPS
23-Introduction to Serial Interfacing and UART
24-Serial interfacing over UART
25-NAND Glitching
26-SPI and I2C – Introduction and Dumping data
27-Writing and Reading EEPROM using Arduino
28-Introduction to JTAG
29-Identifying JTAG pinouts using Arduino
30-JTAGulator
31-Debugging with JTAG
32-Introduction to SDR
33-Getting started with GNU Radio companion
34-Decoding captured AM Signal
35-Capturing FM signals using RTL-SDR
36-Analysing wireless doorbells using RTL-SDR
37-Extracting text from signal
38-Extracting text from Signal – part 2 (using Audacity)
39-a-Introduction to BLE
39-b-BLE Cracking and Pairing modes
40-Sniffing BLE using Ubertooth
41-Introduction to Zigbee and Sniffing
42-a-Zigbee Exploitation – part one
42-b-Zigbee Exploitation – Part 2
43-Conclusion video


To see this hidden content, you must reply and react with one of the following reactions : Like Like
 
  • Tags
    academy exploitation internet internet of things iot pentester things
  • Top