Anyone Can Find This IoT Vulnerability - Command Injection Tutorial

Anyone Can Find This IoT Vulnerability - Command Injection Tutorial

The Cyber Mentor via YouTube Direct link

0:00: Intro

1 of 10

1 of 10

0:00: Intro

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Anyone Can Find This IoT Vulnerability - Command Injection Tutorial

Automatically move to the next video in the Classroom when playback concludes

  1. 1 0:00: Intro
  2. 2 1:15: What is Command Injection
  3. 3 2:13: Getting the firmware
  4. 4 5:02: Unpacking firmware
  5. 5 9:50: Enumerating root file system
  6. 6 17:07: TCM certification message
  7. 7 17:41: Exploring web interface
  8. 8 23:59: Tracing logging strings to binaries and libs
  9. 9 26:53: Reverse engineering with Ghidra
  10. 10 32:56: Exploiting vulnerability

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.