Hands-On IoT Penetration Testing

Hands-On IoT Penetration Testing

English | MP4 | AVC 1920×1080 | AAC 48KHz 2ch | 2h 32m | 703 MB

Perform IoT penetration testing using industry-specific tools and techniques

Pentesting is much like taking a battering ram to the door of a fortress. You keep pounding away but try to find a secret backdoor to enter through. But what happens if pieces of the network are outside the fortress? The solution to this problem is IOT pentesting.
This course begins with the IoT device architecture to help you understand the most common vulnerabilities. You’ll explore networks, sniffing out vulnerabilities while also ensuring that the hardware devices and the software running on them are free of any security loopholes.
Moving on, you will learn how to perform pentesting on advanced IoT Devices including Amazon Eco, Logitech Cameras, the Google Nexus phone, Vyos Gateways, TP-Link Smart Switches, and firewalls. By the end of the course, you will be able to create IoT pentesting reports. After completion of the course, you will be able to penetrate even the most densely populated IoT networks.

To satisfy market demands, this course is designed to enhance the skills of professionals working in IoT Pentesting. We realize the importance of the student’s time and goals and emphasized on the practicality of the subject

What You Will Learn

  • Set up Lab Environment for IoT Pentesting.
  • Establish a secure Network Architecture of Internet of things (IoT)
  • Secure your Pro-Cam by Pentesting it with Metasploit
  • Perform Gateway Penetration Testing on VyOS by hacking the gateway and its services
  • Implement Wireless Penetration Testing on your Google wireless device
  • Perform Endpoint Penetration Testing on Client Servers and Machines like Amazon echo, tp -link device and software firewalls like Comodo and private eye
  • Pentest your Android devices with Android Studio
  • Generate a successful report in the end with Magic Tree and Dradis
Table of Contents

01 The Course Overview
02 Architecture of IoT
03 IoT Pentesting Overview
04 How to Get the Most out of This Course
05 Download and Install VMware Workstation
06 Download Windows and Kali Linux
07 Installation of Kali Linux and Windows in VMware Workstation
08 Set Up a Logitech Camera in the Network
09 System Pentesting Using Kali Linux
10 Take Access of the Camera
11 Take Pictures and Record Videos
12 Set Up VyOS Brand Gateway in the Network
13 Set Up Login Credentials of VyOS
14 Pentest Services in the Router
15 Take Access of Gateway Completely
16 Set Up a Google IoT Device
17 Hack Wireless Using Kali Linux
18 Get Access to the Network
19 Hack Other IoT Devices in the Network
20 Amazon Echo Pentesting
21 TP-Link Smart Switch Pentesting
22 Comodo Firewall Pentesting
23 Private Eye Firewall Pentesting
24 Download and Installation of Android Studio
25 Set Up Google Nexus Android Phone
26 Installation of Android APK File
27 Hack Android Phone and Get Login Credentials
28 IoT Pentesting Report Overview
29 Report Generation Using the MagicTree Tool
30 Report Generation Using the Metagoofil Tool
31 Summary of IoT Pentesting Report