CRO
Hands-On IoT Penetration Testing
## Sunil Gupta
## Estimated time to complete: 2h 32m
## Topics Penetration Testing / Ethical Hacking
## Published byPackt Publishing 2018
>> 2018x11
>> 12x50
// https://www.packtpub.com/
\\ https://www.safaribooksonline.com/
// https://www.informit.com/
Perform IoT penetration testing using industry-specific
tools and techniques
About This Video
Quickly set up your pentesting environment and get
equipped with major tools such as Metasploit, Android
Studio, Hydra, Medusa, Dradis, Magictree, and more.
Perform IoT pentesting using software and hardware
devices.
Generate and analyze IOT pentesting reports.
In Detail
Pentesting is much like taking a battering ram to the
door of a fortress. You keep pounding away but try to
find a secret backdoor to enter through. But what
happens if pieces of the network are outside the
fortress? The solution to this problem is IOT
pentesting.
This course begins with the IoT device architecture to
help you understand the most common vulnerabilities.
You'll explore networks, sniffing out vulnerabilities
while also ensuring that the hardware devices and the
software running on them are free of any security
loopholes.
Moving on, you will learn how to perform pentesting on
advanced IoT Devices including Amazon Eco, Logitech
Cameras, the Google Nexus phone, Vyos Gateways, TP-Link
Smart Switches, and firewalls. By the end of the course,
you will be able to create IoT pentesting reports. After
completion of the course, you will be able to penetrate
even the most densely populated IoT networks.
WEE ASUMME NO LIIABILLITY FUR A WROONG SPELING
COZ WEE ARRE A NON (iL)LiTERATE GRUP!!
TANNKS TU THE LITERATE ASKII FRIIEND!!