sudoninja book
Ctrlk
  • sudoninja book
  • About us
  • Security Area
    • Penetration Testing Methodologies
    • How to Find CVE
    • DAST/SAST
    • Penetration-Testing
    • Web Application Penetration Testing
    • Network Penetration Testing
    • Mobile Penetration testing
    • Active Directory penetration testing
    • API Penetration Testing
    • Source Code Review
    • CTF
    • IOT Penetration Testing
      • Methodology
        • CCTV
          • 1.Hardware Level Security Parameter
            • 1.1 Test Secure Debug Interfaces
            • 1.2 Verify Unique Cryptographic Keys and Certificates
            • 1.3 Test On-Chip Debug Interface Security
            • 1.4 Test Trusted Execution Implementation
            • 1.5 – Verify Secure Storage of Sensitive Data
            • 1.6 – Check Tamper Resistance Features
            • 1.7 – Test Intellectual Property Protection Enablement
            • 1.8 – Verify Boot Image Signature Validation
            • 1.9 – Check Cryptographic PRNG Utilization
          • 2.Software/Firmware
          • 3.Secure Process Conformance
          • 4. Security Conformance at Product Development Stage
      • Cheat sheet
      • Book
      • Mind Map
      • Check list
      • Blog
      • Video
      • Report
      • Tool
      • Vulnerable IoT Labs
    • Red Teaming
    • Cloud Security
    • Bug Bounty Hunting
    • Thick Client Pentesting
    • Malware Analysis
    • DevSecOps
    • Wireless Penetration Testing
    • LLM penetration Testing
  • Practice and improve skills
  • list of Vulnerabilities-1
  • list of Vulnerabilities-2
  • Tool
  • Note
  • AWAE/OSWE
  • Burp Suite Certified Practitioner
  • Pentesting Bible
  • Free Certification
  • Hack The Box
  • Bookmark
  • Report
  • Lab
  • Framework
  • CheatSheet
  • Mind Map
  • Certifications
  • Research Tool
  • Learn for Fun
  • POST
Powered by GitBook
On this page

Was this helpful?

  1. Security Area
  2. IOT Penetration Testing
  3. Methodology
  4. CCTV

1.Hardware Level Security Parameter

1.1 Test Secure Debug Interfaces1.2 Verify Unique Cryptographic Keys and Certificates1.3 Test On-Chip Debug Interface Security1.4 Test Trusted Execution Implementation1.5 – Verify Secure Storage of Sensitive Data1.6 – Check Tamper Resistance Features1.7 – Test Intellectual Property Protection Enablement1.8 – Verify Boot Image Signature Validation1.9 – Check Cryptographic PRNG Utilization
PreviousCCTVNext1.1 Test Secure Debug Interfaces

Last updated 3 months ago

Was this helpful?