Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Taking Over the World Through MQTT - Aftermath

Black Hat via YouTube

Overview

Explore the aftermath of MQTT protocol vulnerabilities in this 40-minute Black Hat conference talk. Delve into the findings from a custom-built endpoint testing tool, examining how protocol data is often stored in SQL databases and the resulting security implications. Analyze the current state of MQTT security, comparing it to the situation from over a year ago. Discover newly identified vulnerable devices and learn about the global response to these security concerns. Gain insights into SQL and server attacks facilitated through the MQTT protocol, and understand the evolving landscape of IoT security threats.

Syllabus

Taking Over the World Through MQTT - Aftermath

Taught by

Black Hat

Reviews

Start your review of Taking Over the World Through MQTT - Aftermath

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.