Главная
Study mode:
on
1
Introduction
2
About Aditya Gupta
3
IOT Bug Bounties
4
Systemic Approach
5
Micro and Macro
6
Components
7
Security
8
Component Mapping
9
IOT Devices
10
Embedded Device Hacking
11
Open Device
12
UART
13
JTAGulator
14
Placing
15
Firmware
16
Extracting the firmware
17
Hardcoded sensitive values
18
Mobile applications
19
Radio communications
20
Ble
Description:
Explore IoT bug bounty hunting techniques in this 48-minute conference talk from LevelUp 2017. Learn actionable strategies for identifying vulnerabilities in IoT and smart devices, including firmware analysis, hardware hacking, and radio communication exploits. Gain skills to perform attack surface mapping on commercial IoT devices, focusing on components like UART, JTAG, and BLE. Discover methods for extracting firmware, uncovering hardcoded sensitive values, and assessing mobile applications associated with IoT products. By the end, acquire the knowledge to systematically approach IoT security assessments and contribute to bug bounty programs.

Hacking Internet of Things for Bug Bounties - Aditya Gupta, LevelUp 2017

Bugcrowd
Add to list