Veerababu Penugonda 40a8fb8200 Update README.md
2018-05-27 10:34:49 +05:30
2018-05-27 10:34:49 +05:30

IoT Penetesting 101 && IoT security 101

Approach Methodology

  1. Network
  2. Web (Front & Backend and Web services)
  3. Mobile App(Android & iOS)
  4. Wireless Connectivity
  5. Firmware Pentesting(Hardware or IoT device OS)
  6. Hardware Level Approach

Contents

Network

Web (Front & Backend and Web services)

Mobile App(Android & iOS)

Wireless Connectivity

Firmware Pentesting(Hardware or IoT device OS)

Hardware Level Approach

INTRODUCTION

- [Introduction to IOT] https://en.wikipedia.org/wiki/Internet_of_things
- [IOT Architecture]https://www.c-sharpcorner.com/UploadFile/f88748/internet-of-things-part-2/
- [IoT attack surface]#https://www.owasp.org/index.php/IoT_Attack_Surface_Areas
- [IoT Protocols Overview]#Shttps://www.postscapes.com/internet-of-things-protocols/