Introduction
What?
Learn which tools we can use and whether we can expand those tools’ capabilities.
Why?
Assessing the security of services in IoT systems can sometimes be challenging, because these systems often use newer protocols supported by very few security tools, if any at all.
How?
Network assessments
Analysing protocols
Exploiting Zero-Configuration Networking