Beginner’s Guide to Pentesting IoT Architecture/Network and Setting Up IoT Pentesting Lab – Part 1

Beginner’s Guide to Pentesting IoT Architecture/Network and Setting Up IoT Pentesting Lab – Part 1

In this post, I will explain how to pentest an IoT Network/Architecture. Also, I will explain how to set up an IoT Pentesting lab for getting started with IoT Pentesting. Since the post is too long,... Go on to the site to read the full article ... Read More
Gaining Shell Access via UART Interface Part 3

Gaining Shell Access via UART Interface Part 3

This is the 3rd post in IoT-Hacking-Shell-via-UART series. I hope you have gone through the first two parts. If not, please go through them. In this part, I will explain how I was able to gain shell... Go on to the site to read the full article ... Read More

Gaining Shell Access via UART Interface Part 2

This is the 2nd post in IoT-Hacking-Shell-via-UART series. I hope you have gone through the first part. If not, please go through it. In this post, I will cover Baud Rate, lab setup for performing... Go on to the site to read the full article ... Read More

Gaining Shell Access via UART Interface Part 1

What is IoT The Internet of Things (IoT) is the network of physical devices, vehicles, home, appliances, vehicle, and other items embedded with electronics, software, sensors, actuators, and... Go on to the site to read the full article ... Read More
Beginner’s guide to Pentesting IoT Architecture/Network and Setting up IoT Pentesting Lab – Part 2

Beginner’s guide to Pentesting IoT Architecture/Network and Setting up IoT Pentesting Lab – Part 2

This is the 2nd part in Pentesting and Setting up our own IoT Lab. I hope you have gone through the first part. If not, please go through it. Pentesting and Setting up our own Lab – Instead of... Go on to the site to read the full article ... Read More
IoT Firmware Analysis — Firmwalker

IoT Firmware Analysis — Firmwalker

IoT is the next big technology that will change the way we communicate and exchange data. Every day thousands of IoT devices are coming into the market. Most of these devices collect and exchange... Go on to the site to read the full article ... Read More
Tiredful API Part Two

Tiredful API Part Two

This is the 2nd part of the solving Tiredful-API series. I hope you have gone through the 1st part. If not, please go through it. Tiredful Challenges and Solutions Cross Site Scripting (XSS)... Go on to the site to read the full article ... Read More
Tiredful API Part One

Tiredful API Part One

In this post, I will explain how to solve Tiredful-API. Let’s start. What is TIREDFUL-API TIREDFUL-API is an intentionally designed broken web application based on REST API. The App aims to... Go on to the site to read the full article ... Read More
IoT Radio Communication Attack

IoT Radio Communication Attack

| | Hacking
This is the 4th part of the “IoT – Radio Communication Attack” series. It is important to review the other three articles to have a good understanding of the material covered in this... Go on to the site to read the full article ... Read More
IoT Radio Communication Attack – Part Three

IoT Radio Communication Attack – Part Three

| | Hacking
This is the 3rd part in the series named “IoT – Radio Communication Attack.” I hope you have read the first and second part, if not please go through it. I hope you have installed GNU... Go on to the site to read the full article ... Read More
Loading...