Category: IoT Security
VAPT techniques for IoT
The Internet of Things is an emerging technology. The Internet of Things (IoT) is the system of physical objects like devices, vehicles, homes, and different things embedded with electronics, software, sensors,…More ...
Penetesting Industry 4.0 IoT Prototype – 5
Here is the collection of videos of previous 4 articles. These videos show in steps how the setup was attacked and vulnerabilities were exploited. Video 1 Video 2 Video 3More ...
Penetesting Industry 4.0 IoT Prototype – 4
Must have security measures for Industry 4.0 Firmware integrity and secure boot: Secure boot uses cryptographic code signing techniques, assures that a device only executes code generated by the device OEM…More ...
Penetesting Industry 4.0 IoT Prototype – 3
Step 3: Hosting the payload on a Website To host the payload, we use the inbuilt apache server. Replacing the default “index.html” file with the generated payload file saved in “/var/www/html”…More ...
Penetesting Industry 4.0 IoT Prototype – 2
Remotely Hacking into Raspberry Pi Step 1: Creating a TCP Tunnel The first step to hack into any device on a different network is to create a TCP tunnel. This can…More ...
Penetesting Industry 4.0 IoT Prototype – 1
Penetesting Industry 4.0 IoT Prototype Why we did this? Valency Networks is established into VAPT market but walking path of making IoT based industries secure. There is a great deal of…More ...
Considering ISO27001 for IoT Security Readiness
Manufacturing companies are heading towards IoT (Internet of Things) in a fast pace. While most of the companies are focused on automating their production processes, they seems to be losing focus…More ...
IOT Vulnerability Assessment using Raspberry Pi2
IOT Vulnerability Assessment and Penetration Testing IOT, which is a buzzword in many business industries and also its becoming one of the most important trend in the history of the software…More ...
Basics Of IoT Security Threat Modelling
⦁ Basic of IoT Security Threat Modelling The Internet of Things or IoT as we call it can be treated as to be interrupting the interruption. IoT where all the non…More ...