Hacking IoT Flashcards

1
Q

IOT technologies and protocols

A

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is IoT

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Basic cloud model

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IoT architecture

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IoT Communication models

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Just read Challenges of IoT

A

Just remember the IoT specific stuff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IoT. Problems

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

OWASP top 10 vulnerabilities and obstacles

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IoT attack surface areas

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IMP IoT threats

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hacking IoT general scenario

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DDoS attack

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Exploit HVAC

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Rolling code attack

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

BlueBorne Attack

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Jamming attack

A

A

17
Q

Hacking smart grid Remotr access using back door

A

A

18
Q

Other IoT Attacks

A

A

19
Q

Dyn attack

A

A

20
Q

IoT Hacking Methodology

A

A

21
Q

Info gathering

A

A

22
Q

Vulnerability scanning RIoT

A

A

23
Q

Foren6

A

A

24
Q

RFCrack

A

A

25
Q

Attify Zigbee

A

A

26
Q

HackRF

A

A

27
Q

Maintain access by exploiting firmware

A

A

28
Q

Info gathering tools

A

A

29
Q

Sniffing tools

A

A

30
Q

Vulnerability scanners

A

A

31
Q

IoT Hacking Tools

A

A

32
Q

How to defend against IoT attacks

A

A

33
Q

Guidelines for IoT device manufacturer int companies

A

A

34
Q

Owasp 10 vulnerabilities

A

A

35
Q

IoT frame work security considerations

A

A

36
Q

IoT security tools

A

A

37
Q

Read pentest

A

A