Overview
This course provides a retrospective on 5 years of IoT vulnerability research and numerous 0days presented at DefCamp 2021. The learning outcomes include gaining insights into IoT vulnerability research, understanding various attack vectors, and learning about vulnerability tracking and policy changes. The course teaches skills such as vulnerability research, publishing findings, identifying reusable attack vectors, analyzing authentication packets, and conducting cloud-related attacks. The teaching method involves presenting hands-on talks and sharing the latest research and practices in the INFOSEC field. The intended audience for this course includes decision makers, security specialists, entrepreneurs, developers, and individuals interested in hacking and information security.
Syllabus
Introduction
Welcome
About me
Vulnerability research
Publishing
Reusable attack vectors
Authentication packets
Cloud implementations
Command injection
MQTT
MQTT Leak
RSTP Leak
Buffer Overflow
Cloud related attacks
Avoid highprofile brands
Vulnerability tracking
Policy changes
Taught by
DefCamp