IoT threat landscape
Network hacking
Hardware hacking
Radio hacking
Targeting the ecosystem
Understand the protocols that interact directly with a system’s electronic components.
Target IoT devices at the physical level.
UART, JTAG, and SWD exploitation
SPI and I2C
Firmware hacking