O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Hands-On IoT Penetration Testing

Video Description

Perform IoT penetration testing using industry-specific tools and techniques

About This Video

  • Quickly set up your pentesting environment and get equipped with major tools such as Metasploit, Android Studio, Hydra, Medusa, Dradis, Magictree, and more.
  • Perform IoT pentesting using software and hardware devices.
  • Generate and analyze IOT pentesting reports.

In Detail

Pentesting is much like taking a battering ram to the door of a fortress. You keep pounding away but try to find a secret backdoor to enter through. But what happens if pieces of the network are outside the fortress? The solution to this problem is IOT pentesting.

This course begins with the IoT device architecture to help you understand the most common vulnerabilities. You'll explore networks, sniffing out vulnerabilities while also ensuring that the hardware devices and the software running on them are free of any security loopholes.

Moving on, you will learn how to perform pentesting on advanced IoT Devices including Amazon Eco, Logitech Cameras, the Google Nexus phone, Vyos Gateways, TP-Link Smart Switches, and firewalls. By the end of the course, you will be able to create IoT pentesting reports. After completion of the course, you will be able to penetrate even the most densely populated IoT networks.

Table of Contents

  1. Chapter 1 : Welcome to the World of Internet of Things
    1. The Course Overview 00:01:51
    2. Architecture of IoT 00:02:31
    3. IoT Pentesting Overview 00:02:04
    4. How to Get the Most out of This Course? 00:01:21
  2. Chapter 2 : Setting Up a Network Lab
    1. Download and Install VMware Workstation 00:04:38
    2. Download Windows and Kali Linux 00:06:42
    3. Installation of Kali Linux and Windows in VMware Workstation 00:04:37
  3. Chapter 3 : Logitech Pro Stream Camera Pentesting
    1. Set Up a Logitech Camera in the Network 00:01:16
    2. System Pentesting Using Kali Linux 00:11:05
    3. Take Access of the Camera 00:04:08
    4. Take Pictures and Record Videos 00:06:34
  4. Chapter 4 : VyOS – IoT Gateway Pentesting
    1. Set Up VyOS Brand Gateway in the Network 00:04:58
    2. Set Up Login Credentials of VyOS 00:05:58
    3. Pentest Services in the Router 00:03:09
    4. Take Access of Gateway Completely 00:08:12
  5. Chapter 5 : Google Wireless IoT Device Pentesting
    1. Set Up a Google IoT Device 00:05:15
    2. Hack Wireless Using Kali Linux 00:07:16
    3. Get Access to the Network 00:08:03
    4. Hack Other IoT Devices in the Network 00:01:42
  6. Chapter 6 : Hardware and Software IoT Pentesting
    1. Amazon Echo Pentesting 00:03:59
    2. TP-Link Smart Switch Pentesting 00:02:52
    3. Comodo Firewall Pentesting 00:04:07
    4. Private Eye Firewall Pentesting 00:02:15
  7. Chapter 7 : Google Nexus Android Device Pentesting
    1. Download and Installation of Android Studio 00:06:37
    2. Set Up Google Nexus Android Phone 00:04:58
    3. Installation of Android APK File 00:05:57
    4. Hack Android Phone and Get Login Credentials 00:11:58
  8. Chapter 8 : IoT Pentesting Report Generation
    1. IoT Pentesting Report Overview 00:03:20
    2. Report Generation Using the MagicTree Tool 00:06:30
    3. Report Generation Using the Metagoofil Tool 00:05:28
    4. Summary of IoT Pentesting Report 00:02:53