CVF 2089 - Internet of Things Hacking Credits: 3 Hours/Week: Lecture 2 Lab 2 Course Description: This course builds on the topics covered in CVF 2086 and CVF 2088. This class will focus on how cybercriminals identify and abuse weaknesses found on Internet of Things (IoT) devices. IoT devices can include internet connected web cameras, refrigerators, sprinkler systems, beds, and much more. This course includes how cybercriminals identify and abuse issues in IoT devices to include API weaknesses, wireless attacks, mobile application attacks, finding sensitive data in the cloud, and escalating privileges on compromised devices. Hands on labs will be used to ensure students finish the course with practical skills to take to the work place. MnTC Goals None
Prerequisite(s): CVF 2086 with grade of C or higher OR instructor consent. Corequisite(s): None Recommendation: None
Major Content 1. Internet of Things Discovery
- Port Scanning
- Open Source Intelligence
- Wireless Scanning
2. Internet of Things Devices
- Printers
- Web Cameras
- Kiosks
- Miscellaneous
3. Mobile Applications
- Source Code Analysis
- Local Sensitive Data Exposure
- Admin Abuse
- Data in Transit
4. Wireless
- Wi-Fi Attacks
- ZigBee Attacks
- Bluetooth Attacks
5. Application Programming Interfaces
- Finding Targets
- Common Weaknesses
6. Cloud
- Authentication
- Public Data Exposure
- Multi-Factor Bypasses
7. Local Device Attacks
- Breaking out of restricted shells
- Privilege Escalation
- Physical Attacks
- Pivoting
Learning Outcomes At the end of this course, students will be able to:
1. identify when an internet of things device or appliance is on the network.
2. identify how a cybercriminal can abuse an internet of things device.
3. articulate how to remediate critical vulnerabilities in internet of things devices.
4. articulate security common measures that should be taken when deploying internet of things devices.
5. explain the value of simulating and testing attacks against internet of things devices on a corporate network.
6. identify tools and resources needed to simulate attacks against internet of things devices.
7. create robust vulnerability/simulation documentation.
8. identify security gaps in internet of things devices.
9. identify and abuse flaws in printers.
10. identify and abuse flaws in network connected web cameras.
11. identify and abuse flaws in wireless protocols on internet of things devices.
12. identify and abuse flaws in mobile applications.
13. identify and abuse flaws in internet of things APIs.
14. identify and abuse flaws in internet of things data stored in the cloud.
15. identify and abuse flaws in internet of things devices after gaining access. Competency 1 (1-6) None Competency 2 (7-10) None Courses and Registration
Add to Portfolio (opens a new window)
|