Hacking IoT Flashcards

(37 cards)

1
Q

IOT technologies and protocols

A

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is IoT

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Basic cloud model

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IoT architecture

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IoT Communication models

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Just read Challenges of IoT

A

Just remember the IoT specific stuff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IoT. Problems

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

OWASP top 10 vulnerabilities and obstacles

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IoT attack surface areas

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IMP IoT threats

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hacking IoT general scenario

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DDoS attack

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Exploit HVAC

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Rolling code attack

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

BlueBorne Attack

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Jamming attack

17
Q

Hacking smart grid Remotr access using back door

18
Q

Other IoT Attacks

19
Q

Dyn attack

20
Q

IoT Hacking Methodology

21
Q

Info gathering

22
Q

Vulnerability scanning RIoT

23
Q

Foren6

24
Q

RFCrack

25
Attify Zigbee
A
26
HackRF
A
27
Maintain access by exploiting firmware
A
28
Info gathering tools
A
29
Sniffing tools
A
30
Vulnerability scanners
A
31
IoT Hacking Tools
A
32
How to defend against IoT attacks
A
33
Guidelines for IoT device manufacturer int companies
A
34
Owasp 10 vulnerabilities
A
35
IoT frame work security considerations
A
36
IoT security tools
A
37
Read pentest
A