Pwning IoT Devices Through Their Applications - From AppSec to IoT Security

Pwning IoT Devices Through Their Applications - From AppSec to IoT Security

OWASP Foundation via YouTube Direct link

Intro

1 of 32

1 of 32

Intro

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Pwning IoT Devices Through Their Applications - From AppSec to IoT Security

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Common perception
  3. 3 Requirements
  4. 4 IoT Top 10
  5. 5 The proper venn diagram
  6. 6 March 2020
  7. 7 What is live streaming
  8. 8 Hardware encoder
  9. 9 Fixing color balance
  10. 10 Port scan
  11. 11 Firmware backup
  12. 12 Password file
  13. 13 Password hash
  14. 14 Demonstration
  15. 15 Application Security Assessment
  16. 16 Authentication
  17. 17 Backdoor
  18. 18 HTTP Request
  19. 19 Code Review
  20. 20 Find
  21. 21 Multipart data
  22. 22 File upload
  23. 23 PNG upload
  24. 24 Buffer overflow
  25. 25 RTSP
  26. 26 Denial of service
  27. 27 Showdown
  28. 28 Responsible disclosure
  29. 29 Cert Coordination Center
  30. 30 Huawei
  31. 31 Ten months later
  32. 32 Summary

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.