02-Mapping Attack surface and previous vulnerabilities
03-Firmware analysis – Identifying hardcoded secrets
04-Emulating firmware binary
05-Backdooring a firmware – 1
09-Using Burp for IoT Web app security
10-Exploiting Command Injection – Part 1
12-CSRF and Firmware diffing
13-Conventional Attack vectors
14-Conventional attack vectors – Password cracking
15-Analysing Smart Plug – Getting started
17-Controlling Smart Plug
18-Getting started with ARM
19-Buffer overflow on ARM
20-Exploit Development on ARM
21-Using Radare2 for MIPS binary analysis
22-Exploitation using GDB remote debugging on MIPS
23-Introduction to Serial Interfacing and UART
24-Serial interfacing over UART
25-NAND Glitching
26-SPI and I2C – Introduction and Dumping data
27-Writing and Reading EEPROM using Arduino
28-Introduction to JTAG
29-Identifying JTAG pinouts using Arduino
30-JTAGulator
31-Debugging with JTAG
32-Introduction to SDR
33-Getting started with GNU Radio companion
34-Decoding captured AM Signal
35-Capturing FM signals using RTL-SDR
36-Analysing wireless doorbells using RTL-SDR
37-Extracting text from signal
38-Extracting text from Signal – part 2 (using Audacity)
39-a-Introduction to BLE
39-b-BLE Cracking and Pairing modes
40-Sniffing BLE using Ubertooth
41-Introduction to Zigbee and Sniffing
42-a-Zigbee Exploitation – part one
42-b-Zigbee Exploitation – Part 2
43-Conclusion video