Obvious disclaimer and as mentioned in the video: Do not do this on any device you don't own! That would be illegal and could have serious consequences.
This is a recording from a lecture I gave at a Sydney Based University. In this video I demonstrated the vulnerabilities of IoT devices and how they need the same protection as any other device we expose to the internet.
Obviously to fit within a 15-minute time frame, this process is expedited, and the scanning and information gather / enumeration phases would take much longer. As well as the exploit phase could rely on a CSRF attack as opposed to a brute-force. Regardless, the aim was to demonstrate the same vulnerabilities can still be present of devices we may not expect to have them.
===== About JSON : Sec =====
JSON Sec is a Cyber Security Awareness YouTube channel, bringing you a range of videos from technical tutorials, security tips and documentaries. The goal is to help everybody through all technical levels to improve the security of their digital life.
Please consider subscribing if you enjoyed this video!
Produced by: Jason Ford