Главная
Study mode:
on
1
Intro
2
What is IoT
3
What is an IoT security researcher
4
Device interfaces
5
Basic tools
6
What tools are useful
7
JTAG
8
Flash
9
Universal interfaces
10
Binary analysis
11
Logic Analyzer
12
Power Supply
13
Summary
Description:
Explore the challenges and tools for IoT security assessment in this 28-minute conference talk from BSidesSF 2018. Delve into the unique aspects of IoT and embedded devices that require specialized skills and equipment for effective security evaluation. Learn about hardware and software tools essential for embedded security assessments, including JTAG, flash interfaces, and logic analyzers. Discover how to build the necessary skillset and gain hands-on experience with these tools. Gain insights into device interfaces, basic and advanced tools, binary analysis, and power supply considerations for IoT security research. Equip yourself with the knowledge to understand and evaluate the attack surface introduced by IoT devices in this comprehensive overview of the IoT hacker's toolkit.

The IoT Hacker's Toolkit

Security BSides San Francisco
Add to list