Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

When the Doorbell Betrays You - Wireless IoT Hacking with Bluetooth and MITM

Ekoparty Security Conference via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore the security vulnerabilities of budget-friendly smart doorbells and wireless IoT cameras in this 28-minute conference talk from Ekoparty Security Conference. Discover how attackers can exploit weak security measures in inexpensive IoT devices to infiltrate WiFi networks and intercept live video feeds through a detailed case study analysis. Learn about various exploitation techniques including Bluetooth sniffing, man-in-the-middle attacks, and firmware extraction through physical device access. Examine the software tools and methodologies used by security researchers to identify and exploit IoT device weaknesses, understanding how cost-effective manufacturing often compromises robust security implementation. Gain insights into the practical aspects of IoT penetration testing and vulnerability assessment from a DevOps professional and cybersecurity enthusiast who specializes in finding critical security flaws and has contributed to multiple CVEs through bug bounty hunting activities.

Syllabus

When the Doorbell Betrays You: Wireless IoT Hacking with Bluetooth & MITM - Daniel Schwendner

Taught by

Ekoparty Security Conference

Reviews

Start your review of When the Doorbell Betrays You - Wireless IoT Hacking with Bluetooth and MITM

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.