001-Introduction to IoT Security
002-Mapping Attack surface and previous vulnerabilities
002-b-Setting up your IoT pentesting VM
003-Firmware analysis - Identifying hardcoded secrets
003-a-Firmware Analysis 101
004-Emulating firmware binary
005-Backdooring a firmware - 1
006-Backdooring a firmware - 2
007-Firmware Emulation using FAT
008-Web application security for IoT devices
009-Using Burp for IoT Web app security
010-Exploiting Command Injection - Part 1
011-Exploiting Command Injection - Part 2
012-CSRF and Firmware diffing
013-Conventional Attack vectors
014-Conventional attack vectors - Password cracking
015-Analysing Smart Plug - Getting started
016-Reversing Smart plug encryption
017-Controlling Smart Plug
018-Getting started with ARM
019-Buffer overflow on ARM
020-Exploit Development on ARM
021-Using Radare2 for MIPS binary analysis
022-Exploitation using GDB remote debugging on MIPS
023-Introduction to Serial Interfacing and UART
024-Serial interfacing over UART
025-NAND Glitching
026-SPI and I2C - Introduction and Dumping data
027-Writing and Reading EEPROM using Arduino
028-Introduction to JTAG
029-Identifying JTAG pinouts using Arduino
030-JTAGulator
031-Debugging with JTAG
032-Introduction to SDR
033-Getting started with GNU Radio companion
034-Decoding captured AM Signal
035-Capturing FM signals using RTL-SDR
036-Analysing wireless doorbells using RTL-SDR
037-Extracting text from signal
038-Extracting text from Signal - part 2 (using Audacity)
039-a-Introduction to BLE
039-b-BLE Cracking and Pairing modes
040-Sniffing BLE using Ubertooth
041-Introduction to Zigbee and Sniffing
042-a-Zigbee Exploitation - part one
042-b-Zigbee Exploitation - Part 2