Learn the Skills Netflix, Meta, and Capital One Actually Hire For
Google, IBM & Microsoft Certificates — All in One Plan
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a comprehensive retrospective on five years of IoT vulnerability research and numerous zero-day exploits presented at DefCamp 2021. Delve into topics such as reusable attack vectors, authentication packets, cloud implementations, command injection, MQTT and RSTP leaks, buffer overflow, and cloud-related attacks. Gain insights on vulnerability tracking, policy changes, and strategies for avoiding high-profile brands in IoT security research. Learn from hands-on experiences and practical approaches to identifying and addressing security vulnerabilities in the rapidly evolving Internet of Things landscape.
Syllabus
Introduction
Welcome
About me
Vulnerability research
Publishing
Reusable attack vectors
Authentication packets
Cloud implementations
Command injection
MQTT
MQTT Leak
RSTP Leak
Buffer Overflow
Cloud related attacks
Avoid highprofile brands
Vulnerability tracking
Policy changes
Taught by
DefCamp