Approach Methodology
- Network
- Web (Front & Backend and Web services)
- Mobile App(Android & iOS)
- Wireless Connectivity
- Firmware Pentesting(Hardware or IoT device OS)
- Hardware Level Approach
- Android Hacker's Handbook
- Hacking the Xbox
- Car hacker's handbook
- IoT Penetration Testing Cookbook
- Abusing the Internet of Things
- Hardware Hacking: Have Fun while Voiding your Warranty
- Linksys WRT54G Ultimate Hacking
- Linux Binary Analysis
- Firmware
- http://iotpentest.com/
- https://blog.attify.com
- https://payatu.com/blog/
- http://jcjc-dev.com/
- https://w00tsec.blogspot.in/
- http://www.devttys0.com/
- https://www.rtl-sdr.com/
- https://keenlab.tencent.com/en/
- Exploit - IoT Exploitation framework - by Aseemjakhar
- AttifyOS - IoT Pentest OS - by Aditya Gupta
- Ubutnu Best Host Linux for IoT's - Use LTS
- A Small, Scalable Open Source RTOS for IoT Embedded Devices
- Introduction
- Reconnaisance
- Hacking the IoT with MQTT
- thoughts about using IoT MQTT for V2V and Connected Car from CES 2014
- Nmap
- The Seven Best MQTT Client Tools
- A Guide to MQTT by Hacking a Doorbell to send Push Notifications
CanBus
- Introduction and protocol Overview
- PENTESTING VEHICLES WITH CANTOOLZ
- Building a Car Hacking Development Workbench: Part1
- Understanding Radio
- Signal Processing
- Software Defined Radio
- Gnuradio
- Creating a flow graph
- Analysing radio signals
- Recording specific radio signal
- Replay Attacks
- Introduction and protocol Overview
- Hacking Zigbee Devices with Attify Zigbee Framework
- Hands-on with RZUSBstick
- Traffic Engineering in a Bluetooth Piconet
- BLE Characteristics Reconnaissance (Active and Passive) with HCI Tools