Offensive IOT Exploitation | Attify


Offensive IOT Exploitation | Attify
English | Size: 2.49 GB
Genre: eLearning

COURSE ABSTRACT
IoT or the Internet of Things is one of the most upcoming trends in technology as of now. A lot many new devices are coming up every single month. However, not much attention has been paid to the device’s security till now.

“Offensive IoT Exploitation” is a brand new and unique course which offers pentesters the ability to assess and exploit the security of these smart devices. The training will cover different varieties of IoT devices, assessing their attack surfaces and writing exploits for them. The 3-day (or 5-day) class will be hands-on giving attendees the ability to try things themselves rather than just watching the slides.

We will start from the very beginning discussing about the architecture of IoT devices, and then slowly moving to firmware analysis, identifying attack surface, finding vulnerabilities and then finally exploiting the vulnerabilities.

The course labs include both emulated environments as well as real live devices which will be provided to the attendees during the training. A custom VM – AttifyOS will be provided by the trainer which will be used for the entire class.

Offensive IoT Exploitation is the course for you if you want to try exploitation on different IoT devices and discover security vulnerabilities and 0-days in IoT devices.

At the end of the class, there will be a final CTF challenge where the attendees will have to identify security vulnerabilities and exploit them, in a completely unknown device.

After the class, the attendees will be able to:

Extract and analyze device firmwares
Debug and Disassemble binaries
Exploit UART, SPI, I2C and JTAGs
JTAG debugging, exploitation
Dump firmware through various techniques
Debug hardware and software
Analyze security of MQTT, CoAP and M2MXML protocols
Attack cloud and mobile component of an IoT device
Sniff, Replay, MITM and Attack Radio communications
BLE and Zigbee exploitation
ARM and MIPS Reversing
Conventional and Un-conventional attack techniques
Side Channel Attacks (Clock, Vcc glitching, breaking crypto)
Write exploits for the platforms
and more.
All the above mentioned topics are taught with an extremely hands-on lab based practical sessions.

DOWNLOAD FROM RAPIDGATOR

rapidgator.net/file/a518d5b9cd713b0cbf15deb4161cc3f4/IoTfucked.part1.rar.html
rapidgator.net/file/077604e85e5f8914f67d3c8d760424e9/IoTfucked.part2.rar.html
rapidgator.net/file/713b21fc2f58b8053f3941cb1c30bfae/IoTfucked.part3.rar.html
rapidgator.net/file/0f708dae701fe54d7ca885bf3901bdb7/IoTfucked.part4.rar.html
rapidgator.net/file/5e4638d3ded1276076587b09bfaa6dd3/IoTfucked.part5.rar.html
rapidgator.net/file/c0c6827b3c1c6bbc3ce081e448e1fa1f/IoTfucked.part6.rar.html
rapidgator.net/file/ca07ebd9ceb91853a995e277514ef3ac/IoTfucked.part7.rar.html

DOWNLOAD FROM TURBOBIT

trbbt.net/8c7r5urjyacx/IoTfucked.part1.rar.html
trbbt.net/f9pkc40kglms/IoTfucked.part2.rar.html
trbbt.net/xdi5wsxcy3va/IoTfucked.part3.rar.html
trbbt.net/uoawzw2rzjgz/IoTfucked.part4.rar.html
trbbt.net/da1eaghejc83/IoTfucked.part5.rar.html
trbbt.net/e4h8941jtfdw/IoTfucked.part6.rar.html
trbbt.net/20xlfxazhk47/IoTfucked.part7.rar.html

If any links die or problem unrar, send request to
forms.gle/e557HbjJ5vatekDV9

Leave a Comment