The Internet of Things is an emerging technology. The Internet of Things (IoT) is the system of physical objects like devices, vehicles, homes, and different…
IoT Security
Penetesting Industry 4.0 IoT Prototype – 5
Here is the collection of videos of previous 4 articles. These videos show in steps how the setup was attacked and vulnerabilities were exploited. Video…
Penetesting Industry 4.0 IoT Prototype – 4
Must have security measures for Industry 4.0 Firmware integrity and secure boot: Secure boot uses cryptographic code signing techniques, assures that a device only executes…
Penetesting Industry 4.0 IoT Prototype – 3
Step 3: Hosting the payload on a Website To host the payload, we use the inbuilt apache server. Replacing the default “index.html” file with the…
Penetesting Industry 4.0 IoT Prototype – 2
Remotely Hacking into Raspberry Pi Step 1: Creating a TCP Tunnel The first step to hack into any device on a different network is to…
Penetesting Industry 4.0 IoT Prototype – 1
Penetesting Industry 4.0 IoT Prototype Why we did this? Valency Networks is established into VAPT market but walking path of making IoT based industries secure….
Considering ISO27001 for IoT Security Readiness
Manufacturing companies are heading towards IoT (Internet of Things) in a fast pace. While most of the companies are focused on automating their production processes,…
IOT Vulnerability Assessment using Raspberry Pi2
IOT Vulnerability Assessment and Penetration Testing IOT, which is a buzzword in many business industries and also its becoming one of the most important trend…
Basics Of IoT Security Threat Modelling
⦁ Basic of IoT Security Threat Modelling The Internet of Things or IoT as we call it can be treated as to be interrupting the…