Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Abusing the Internet of Things - Blackouts, Freakouts, and Stakeouts

Black Hat via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the vulnerabilities and security risks associated with Internet of Things (IoT) devices in this eye-opening 43-minute Black Hat conference talk. Delve into the potential dangers of popular smart home devices, including Philips Hue lighting systems, baby monitors, WiFi cameras, and even Tesla vehicles. Learn about the methods hackers can use to exploit these devices, from finding and manipulating bridges to unauthorized monitoring and control. Discover the implications of flat networks, the future of malware, and the importance of proper security measures in IoT ecosystems. Gain insights into real-world examples, including high-profile cases involving public figures, and understand the steps taken by manufacturers to address these issues. Equip yourself with knowledge to better protect your connected devices and understand the evolving landscape of IoT security.

Syllabus

Intro
Why is this important
Devices
Hue
Bridge
Finding the Bridge
Post Requests
Username
Demo
Contacting Philips
IFTTT
The Future of Malware
The Baby Monitor
Unwelcome Monitoring
Belkin Baby Monitor
Script
Flat networks
WiFi camera
Comcast
Tesla
Chris Christie
Tesla Support
Tesla SDK
Tesla Glass
Key Fob
Ethernet Jack
Tesla Vulnerability
Conclusion

Taught by

Black Hat

Reviews

Start your review of Abusing the Internet of Things - Blackouts, Freakouts, and Stakeouts

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.