Practical Exploitation of IoT Networks and Ecosystems
Deep Armor offers a comprehensive, hands-on approach to pen-testing IoT ecosystems, focusing on exploiting the network (Wireless Sensor Networks), the device mobile and device mobile cloud interoperability, standards and communication protocols. Students will learn to use specialized hardware & software tools to perform hands-on security assessments, including packet capture/manipulation/injection in wireless sensor networks and Bluetooth/BLE channels. The course will include a deep-dive code and logs walkthrough of weaknesses in the Bluetooth specifications on Android through exercises using custom malware applications. Students will learn to bring up AWS IoT Core cloud platform for IoT, and configure the security essentials while architecting such a cloud – device – mobile environment for IoT platforms. Defensive security best practices to proactively identify vulnerabilities, and methodologies to plan and execute end-to-end Security Development Lifecycle (SDL) for IoT products will be taught. Each student will receive a USB dongle that can be used for Zigbee/IEEE 802.15.4 packet sniffing & injection, valued at about USD 50.
Skills / Knowledge
- PenTesting
- IoT