Udemy – Introduction to Hardware Analysis-BooKWoRM
English | Size: 902.59 MB
Category: Tutorial
The security of Internet of Things (IoT) is becoming a hot topic, but this talk is not a typical IoT presentation. It will discuss and demonstrate in-depth research and a solid forensics approach including data, account information and configuration retrieval from IoT devices like routers, IP cameras or Smart TVs
Wikileaks revealed a new CIA wireless pentesting tool called Cherry Blossom which could allow for remotely compromising network devices using MITM attacks, however only a short portion of the report discussed actual hardware hacks. We have been looking into these attacks a year before the WikiLeaks reveal, and have much more to add on the physical testing of the listed routers. We will demonstrate how to obtain privilege of and gain access control as well as access to the firmware and configuration files of the devices mentioned What you ll learn
DOWNLOAD:
https://rapidgator.net/file/70e7e4ab4487d99e6106049c9bc3b9f0/Udemy.com.Introduction.to.Hardware.Analysis-BooKWoRM.part1.rar.html
https://rapidgator.net/file/df205b44a37f536a70564fa11aca3f45/Udemy.com.Introduction.to.Hardware.Analysis-BooKWoRM.part2.rar.html
https://nitroflare.com/view/C13CACA5DDAF7D9/Udemy.com.Introduction.to.Hardware.Analysis-BooKWoRM.part1.rar
https://nitroflare.com/view/17F1B12EDCA19F0/Udemy.com.Introduction.to.Hardware.Analysis-BooKWoRM.part2.rar