OP 19 March, 2021 - 04:55 PM
What You'll Learn :
• Perform a threat model of a real-world IoT device and locate all possible attacker entry points
~
• Perform a threat model of a real-world IoT device and locate all possible attacker entry points
~
• Use reverse engineering of firmware binaries to identify security issues
~
~
• Analyze, assess, and identify security issues in exploited ARM and MIPS based binaries
~
~
• Sniff, capture, and exploit radio communication protocols, such as Bluetooth Low Energy (BLE), and ZigBee
By : Aditya Gupta
By : Aditya Gupta
