kingers Posted August 20, 2023 Report Share Posted August 20, 2023 Beginner's Guide to IoT and Hardware Hacking - TCM SecurityLanguage: English | Size:6.03 GBGenre:eLearningFiles Included :Ethical Hacking and Responsible Disclosure.mp4 (20.12 MB)MP4Intro Beginner's Guide to IoT and Hardware Hacking.mp4 (52.74 MB)MP4Watch This Before Opening Your Router Box.mp4 (51.77 MB)MP41 1 - Section Intro.mp4 (6.35 MB)MP41 10 - Section Challenge Solution.ts (61.14 MB)TS1 2 - What is Electricity Part 1.mp4 (65.65 MB)MP41 3 - What is Electricity Part 2.ts (18.34 MB)TS1 4 - Electrical Engineering Fundamentals Schematics, Voltage Source, Resistors and Ohm's Law.ts (15.58 MB)TS1 5 - Electrical Engineering Fundamentals Kirchov's Voltage Law and Series Circuits.ts (17.1 MB)TS1 6 Electrical Engineering Fundamentals Parallel Circuits and Kirchov's Current Law.ts (29.01 MB)TS1 7 - Circuit Lab Simulation Demo.ts (25.16 MB)TS1 8 - Reading Schematics.ts (20.67 MB)TS1 9 - Section Challenge.ts (38.84 MB)TS2 1 - Electrical Lab Safety.ts (41.06 MB)TS2 2 - Opening the Router.ts (158.43 MB)TS2 3 - ESD Precautions.ts (216.7 MB)TS2 4 - Intro to PCBs.ts (191.34 MB)TS2 5 - Intro to Digital Multimeters.ts (133.14 MB)TS2 6 - Measuring Voltage with DMM.ts (210.8 MB)TS2 7 - Measuring Resistance with DMM.ts (125.91 MB)TS2 8 - Measuring Continuity with DMM.ts (131.92 MB)TS2 9 - Measuring Current with DMM.ts (178.64 MB)TS3 1 - AC DC.ts (30.97 MB)TS3 2 - Capacitors.ts (46.02 MB)TS3 3- Demoing Filters with Circuit Lab.ts (40.56 MB)TS3 4 - Inductors.ts (47.66 MB)TS3 5 - Diodes.ts (54.68 MB)TS3 6 - Transistors.ts (47.81 MB)TS3 7 - Transistor Circuit Lab Example.ts (61.1 MB)TS3 8 - Electronic Communications and Signals.ts (58.58 MB)TS4 1 - Intro to UART Part 1.ts (397.88 MB)TS4 2 - Attaching Header Pins (Solderless).ts (353.15 MB)TS4 3 - Attaching Header Pins (With Solder - Optional).ts (394.77 MB)TS4 4 - Logic Analyzers, Sigrok and Pulseview.ts (193.38 MB)TS4 5 - Intro to UART Part 2.ts (61.54 MB)TS4 6 - Hardware Hacking CTF.ts (66.29 MB)TS5 1 - IoT Architecture and Attack Surface.ts (71.61 MB)TS5 10 - Section and Notes Review.ts (57.46 MB)TS5 2 - Internet Facing IoT Devices.ts (45.65 MB)TS5 3 - Hardware OSINT via FCC ID.ts (70.95 MB)TS5 4 - Embedded System Components.ts (24.42 MB)TS5 5 - Locating and Reading Datasheets.ts (92.77 MB)TS5 6 - Locating Firmware Online.ts (10.96 MB)TS5 7 - Network Setup.ts (38.15 MB)TS5 8 - NMAP Scans.ts (37.04 MB)TS5 9 - Exploring Past CVEs.ts (30.1 MB)TS6 1 - Initiating UART Shell.ts (151.02 MB)TS6 10 - Tricky UART Connections.ts (52.19 MB)TS6 11 - Troubleshooting UART.ts (24.82 MB)TS6 12 - Section and Notes Review.ts (50.8 MB)TS6 2 - Boot Logs and Boot Loader.ts (88.08 MB)TS6 3 - Using TFTP to Exfil Files.ts (46.81 MB)TS6 4 - Using TFTP to Transfer Tools onto Devices.ts (49.35 MB)TS6 5 - Hunting Interesting Files and Passwords.ts (56.14 MB)TS6 6 - Reviewing Files and Cracking Passwords.ts (46.65 MB)TS6 7 - Checking Running Processes and Network Connections.ts (31.58 MB)TS6 8 - Prompting Additional Console Logging.ts (56.58 MB)TS6 9 - Serial Connections via Python.ts (49.39 MB)TS7 1 - Firmware Extraction Methods.ts (18.21 MB)TS7 2 - Serial Peripheral Interface Part 1.ts (62.25 MB)TS7 3 - Serial Peripheral Interface Part 2.ts (303.78 MB)TS7 4 - Extracting Firmware from ROM.ts (217.91 MB)TS7 5 - Firmware Analysis.ts (94.19 MB)TS7 6 - Inspecting Firmware and Manual Firmware Extraction.ts (58.76 MB)TS7 7 - Enumerating Root File System.ts (44.64 MB)TS8 1 - Intro to Reverse Engineering.ts (35.74 MB)TS8 2 - Reverse Engineering Decryption Function Part 1.ts (53.09 MB)TS8 3 - Reverse Engineering Decryption Function Part 2.ts (51.93 MB)TS8 4 - Decrypting Config Files.ts (60.48 MB)TS8 5 - Reviewing util execSystem for Command Injection.ts (79.73 MB)TS8 6 - Tracing Function Calls.ts (63.69 MB)TS8 7 - Section and Notes Reviews.ts (54.22 MB)TS9 1 - End of Course Challenge.ts (108.85 MB)TS9 2 - Course Wrap-Up.ts (19.82 MB)TS Beginner's Guide to IoT and Hardware Hacking - TCM Security.z01https://rapidgator.net/file/b89e18c7c9691f48625c30631e09b9e0/Beginner's_Guide_to_IoT_and_Hardware_Hacking_-_TCM_Security.z01Beginner's Guide to IoT and Hardware Hacking - TCM Security.z02https://rapidgator.net/file/4809e78d2c54795193a87bb5d269c800/Beginner's_Guide_to_IoT_and_Hardware_Hacking_-_TCM_Security.z02Beginner's Guide to IoT and Hardware Hacking - TCM Security.z03https://rapidgator.net/file/8efe63689c1c4daad3d3c403c25e735c/Beginner's_Guide_to_IoT_and_Hardware_Hacking_-_TCM_Security.z03Beginner's Guide to IoT and Hardware Hacking - TCM Security.z04https://rapidgator.net/file/ae1b4f58e9ebb9365cadd7439671da44/Beginner's_Guide_to_IoT_and_Hardware_Hacking_-_TCM_Security.z04Beginner's Guide to IoT and Hardware Hacking - TCM Security.z05https://rapidgator.net/file/5d99e3a320a7b01274f7a0ffacb19e2a/Beginner's_Guide_to_IoT_and_Hardware_Hacking_-_TCM_Security.z05Beginner's Guide to IoT and Hardware Hacking - TCM Security.z06https://rapidgator.net/file/1d1654a5e7d718473963c5ce91f84af8/Beginner's_Guide_to_IoT_and_Hardware_Hacking_-_TCM_Security.z06Beginner's Guide to IoT and Hardware Hacking - TCM Security.z07https://rapidgator.net/file/1b8617fff70729ff3be586eb6e244448/Beginner's_Guide_to_IoT_and_Hardware_Hacking_-_TCM_Security.z07Beginner's Guide to IoT and Hardware Hacking - TCM Security.z08https://rapidgator.net/file/2b4e70643f0341a5ef88a6ff409c404f/Beginner's_Guide_to_IoT_and_Hardware_Hacking_-_TCM_Security.z08Beginner's Guide to IoT and Hardware Hacking - TCM Security.z09https://rapidgator.net/file/dffb6b42b3861a952e5514e9b4a06ac6/Beginner's_Guide_to_IoT_and_Hardware_Hacking_-_TCM_Security.z09Beginner's Guide to IoT and Hardware Hacking - TCM Security.z10https://rapidgator.net/file/2c1051ccbef36350138fd15f575f73c8/Beginner's_Guide_to_IoT_and_Hardware_Hacking_-_TCM_Security.z10Beginner's Guide to IoT and Hardware Hacking - TCM Security.z11https://rapidgator.net/file/265a85e2a7e3b642c18d5b701deacd47/Beginner's_Guide_to_IoT_and_Hardware_Hacking_-_TCM_Security.z11Beginner's Guide to IoT and Hardware Hacking - TCM Security.z12https://rapidgator.net/file/0d7106636067fb1147957c7d1437919e/Beginner's_Guide_to_IoT_and_Hardware_Hacking_-_TCM_Security.z12Beginner's Guide to IoT and Hardware Hacking - TCM Security.ziphttps://rapidgator.net/file/17abf109b2052696fd8a4158fb5a163e/Beginner's_Guide_to_IoT_and_Hardware_Hacking_-_TCM_Security.zip Beginner's Guide to IoT and Hardware Hacking - TCM Security.z01https://1dl.net/itrtr55k1dnt/Beginner%27s_Guide_to_IoT_and_Hardware_Hacking_-_TCM_Security.z01Beginner's Guide to IoT and Hardware Hacking - TCM Security.z02https://1dl.net/yeqt67wc66di/Beginner%27s_Guide_to_IoT_and_Hardware_Hacking_-_TCM_Security.z02Beginner's Guide to IoT and Hardware Hacking - TCM Security.z03https://1dl.net/bg0waltagt31/Beginner%27s_Guide_to_IoT_and_Hardware_Hacking_-_TCM_Security.z03Beginner's Guide to IoT and Hardware Hacking - TCM Security.z04https://1dl.net/jx0a3jiko9p0/Beginner%27s_Guide_to_IoT_and_Hardware_Hacking_-_TCM_Security.z04Beginner's Guide to IoT and Hardware Hacking - TCM Security.z05https://1dl.net/opknce3szwwt/Beginner%27s_Guide_to_IoT_and_Hardware_Hacking_-_TCM_Security.z05Beginner's Guide to IoT and Hardware Hacking - TCM Security.z06https://1dl.net/opg6b8l3vpab/Beginner%27s_Guide_to_IoT_and_Hardware_Hacking_-_TCM_Security.z06Beginner's Guide to IoT and Hardware Hacking - TCM Security.z07https://1dl.net/v3ugjxrojumv/Beginner%27s_Guide_to_IoT_and_Hardware_Hacking_-_TCM_Security.z07Beginner's Guide to IoT and Hardware Hacking - TCM Security.z08https://1dl.net/6fedywv7uso5/Beginner%27s_Guide_to_IoT_and_Hardware_Hacking_-_TCM_Security.z08Beginner's Guide to IoT and Hardware Hacking - TCM Security.z09https://1dl.net/w7prbdcpdupj/Beginner%27s_Guide_to_IoT_and_Hardware_Hacking_-_TCM_Security.z09Beginner's Guide to IoT and Hardware Hacking - TCM Security.z10https://1dl.net/yws55rjodzek/Beginner%27s_Guide_to_IoT_and_Hardware_Hacking_-_TCM_Security.z10Beginner's Guide to IoT and Hardware Hacking - TCM Security.z11https://1dl.net/f7yzr1csjdk6/Beginner%27s_Guide_to_IoT_and_Hardware_Hacking_-_TCM_Security.z11Beginner's Guide to IoT and Hardware Hacking - TCM Security.z12https://1dl.net/315bae1hdauv/Beginner%27s_Guide_to_IoT_and_Hardware_Hacking_-_TCM_Security.z12Beginner's Guide to IoT and Hardware Hacking - TCM Security.ziphttps://1dl.net/wyv5jqdkr0n6/Beginner%27s_Guide_to_IoT_and_Hardware_Hacking_-_TCM_Security.zip Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now