When the Doorbell Betrays You - Wireless IoT Hacking with Bluetooth and MITM
Ekoparty Security Conference via YouTube
-
12
-
- Write review
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore the security vulnerabilities of budget-friendly smart doorbells and wireless IoT cameras in this 28-minute conference talk from Ekoparty Security Conference. Discover how attackers can exploit weak security measures in inexpensive IoT devices to infiltrate WiFi networks and intercept live video feeds through a detailed case study analysis. Learn about various exploitation techniques including Bluetooth sniffing, man-in-the-middle attacks, and firmware extraction through physical device access. Examine the software tools and methodologies used by security researchers to identify and exploit IoT device weaknesses, understanding how cost-effective manufacturing often compromises robust security implementation. Gain insights into the practical aspects of IoT penetration testing and vulnerability assessment from a DevOps professional and cybersecurity enthusiast who specializes in finding critical security flaws and has contributed to multiple CVEs through bug bounty hunting activities.
Syllabus
When the Doorbell Betrays You: Wireless IoT Hacking with Bluetooth & MITM - Daniel Schwendner
Taught by
Ekoparty Security Conference