IoTSecurity101 icon indicating copy to clipboard operation
IoTSecurity101 copied to clipboard

From IoT Pentesting to IoT Security

IoT Pentesting 101 && IoT security 101 Awesome

Approach Methodology

  1. Network
  2. Web (Front & Backend and Web services)
  3. Mobile App(Android & iOS)
  4. Wireless Connectivity
  5. Firmware Pentesting(Hardware or IoT device OS)
  6. Hardware Level Approach

Contents

Get In Touch With Other IoT Hackers

  • https://t.me/iotsecurity1011
  • https://www.iotvillage.org/
  • https://www.ethicalhacker.net/groups/iot

Books

Blogs for iotpentest

  • http://iotpentest.com/
  • https://blog.attify.com
  • https://payatu.com/blog/
  • http://jcjc-dev.com/
  • https://w00tsec.blogspot.in/
  • http://www.devttys0.com/
  • https://www.rtl-sdr.com/
  • https://keenlab.tencent.com/en/
  • https://courk.cc/
  • https://iotsecuritywiki.com/
  • https://cybergibbons.com/
  • http://firmware.re/
  • https://www.securityevaluators.com/blog/

CTF For IoT's And Embeddded

YouTube Channels for Embedded hacking

IoT security vulnerabilites checking guides

Exploitation Tools & OS

Reverse Enginnering Tools

Introduction

IoT Protocols Pentesting

MQTT

CoAP

Automobile

CanBus

Radio IoT Protocols Overview

Base transceiver station (BTS)

GSM & SS7 Pentesting

Zigbee & Zwave

BLE

Mobile security (Android & iOS)

ARM

Firmware Pentest

IoT hardware Overview

Hardware Gadgets to pentest

Attacking Hardware Interfaces

UART

JTAG