Главная
Study mode:
on
1
Intro
2
What is IoT
3
Bluetooth
4
Pairing Methods
5
WiFi Traffic
6
Certificate Pinning
7
Web Security
8
Library Security
9
IoT Basics
10
Personal Protection Devices
11
Roars
12
LE Privacy
13
Roar Athena
14
MAC Address
15
Security
16
Apple Watch
17
Physical Security
18
Bluetooth Security
19
Milwaukee Tool
20
Basic Security
21
What are bearer tokens
22
Stored credentials
23
Bearer token
Description:
Explore the security vulnerabilities in Internet of Things (IoT) devices and their accompanying mobile apps in this 55-minute conference talk from LASCON 2017. Delve into common mistakes, potential attack vectors, and techniques for dissecting IoT systems from a researcher's perspective. Examine real-world examples that highlight security issues in data transmission between devices and the cloud. Learn about various research tools and methodologies used to evaluate IoT security, including Bluetooth pairing methods, WiFi traffic analysis, certificate pinning, and web security. Investigate specific case studies involving personal protection devices, Apple Watch, and Milwaukee Tool, focusing on aspects such as LE privacy, MAC address security, and physical security. Gain insights into basic security concepts like bearer tokens and stored credentials, essential for understanding and improving IoT security.

IoT and the Security of That Mobile App - Mark Loveless

LASCON
Add to list
0:00 / 0:00