物联网黑客简介
Introduction to IoT Hacking
- 1. Introduction
- 1. Understanding the hacking IoT devices
- 2. What you should know
- 2. Dissecting the Internet of Things
- 1. How the Internet of Things Works
- 2. IoT Technologies and Protocols
- 3. IoT Communication Models
- 3. Understanding IoT Attacks
- 1. Challennges of IoT
- 2. IoT OWASP Top 10 Vulnerabilities
- 3. IoT Attack Areas
- 4. IoT Attacks
- 5. IoT Hacking Methodology
- 6. IoT Hacking Demonstration, part 1
- 7. IoT Hacking Demonstration, part 2
- 4. Countermeasure
- 1. Securing IoT Devices
- 5. Conclusion
- 1. Next Steps