Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn to discover command injection vulnerabilities in IoT devices through a practical demonstration that shows how even beginners can identify security flaws in Internet of Things systems. Follow along as cybersecurity expert Andrew Bellini walks through his proven methodology for finding IoT vulnerabilities, starting with firmware acquisition and unpacking, then progressing through root file system enumeration and web interface exploration. Master the process of tracing logging strings to binaries and libraries, utilize reverse engineering techniques with Ghidra, and culminate in successfully exploiting the discovered vulnerability. Gain hands-on experience with firmware analysis, understand command injection attack vectors, and develop the skills needed to identify similar security weaknesses in real-world IoT devices through this comprehensive 39-minute tutorial that demonstrates accessible approaches to hardware hacking and IoT security testing.
Syllabus
0:00: Intro
1:15: What is Command Injection
2:13: Getting the firmware
5:02: Unpacking firmware
9:50: Enumerating root file system
17:07: TCM certification message
17:41: Exploring web interface
23:59: Tracing logging strings to binaries and libs
26:53: Reverse engineering with Ghidra
32:56: Exploiting vulnerability
Taught by
The Cyber Mentor