Introduction

To exploit IoT vulnerabilities and to be able to protect yourself from them, automation is needed to develop weaponized proof of concepts as well as provide scalability for defensive security teams. If security teams do not keep pace with how fast code is being pushed and developed, vulnerabilities are bound to be introduced. Additionally, security teams will need to adapt to the speed of dev teams and not hinder their current processes for security testing as well as review. This chapter will cover advanced IoT exploitation techniques as well as methods of discovering, and preventing IoT vulnerabilities in an automated manner.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.227.111.197