sudoninja book
search
⌘Ctrlk
sudoninja book
  • sudoninja book
  • About us
  • Security Area
    • Penetration Testing Methodologies
    • How to Find CVE
    • DAST/SAST
    • Penetration-Testing
    • Web Application Penetration Testing
    • Network Penetration Testing
    • Mobile Penetration testing
    • Active Directory penetration testing
    • API Penetration Testing
    • Source Code Review
    • CTF
    • IOT Penetration Testing
      • Methodology
        • CCTV
          • 1.Hardware Level Security Parameter
            • 1.1 Test Secure Debug Interfaces
            • 1.2 Verify Unique Cryptographic Keys and Certificates
            • 1.3 Test On-Chip Debug Interface Security
            • 1.4 Test Trusted Execution Implementation
            • 1.5 – Verify Secure Storage of Sensitive Data
            • 1.6 – Check Tamper Resistance Features
            • 1.7 – Test Intellectual Property Protection Enablement
            • 1.8 – Verify Boot Image Signature Validation
            • 1.9 – Check Cryptographic PRNG Utilization
          • 2.Software/Firmware
          • 3.Secure Process Conformance
          • 4. Security Conformance at Product Development Stage
      • Cheat sheet
      • Book
      • Mind Map
      • Check list
      • Blog
      • Video
      • Report
      • Tool
      • Vulnerable IoT Labs
    • Red Teaming
    • Cloud Security
    • Bug Bounty Hunting
    • Thick Client Pentesting
    • Malware Analysis
    • DevSecOps
    • Wireless Penetration Testing
    • LLM penetration Testing
  • Practice and improve skills
  • list of Vulnerabilities-1
  • list of Vulnerabilities-2
  • Tool
  • Note
  • AWAE/OSWE
  • Burp Suite Certified Practitioner
  • Pentesting Bible
  • Free Certification
  • Hack The Box
  • Bookmark
  • Report
  • Lab
  • Framework
  • CheatSheet
  • Mind Map
  • Certifications
  • Research Tool
  • Learn for Fun
  • POST
  • pentest road map
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Security Areachevron-right
  2. IOT Penetration Testingchevron-right
  3. Methodologychevron-right
  4. CCTV

1.Hardware Level Security Parameter

1.1 Test Secure Debug Interfaceschevron-right1.2 Verify Unique Cryptographic Keys and Certificateschevron-right1.3 Test On-Chip Debug Interface Securitychevron-right1.4 Test Trusted Execution Implementationchevron-right1.5 – Verify Secure Storage of Sensitive Datachevron-right1.6 – Check Tamper Resistance Featureschevron-right1.7 – Test Intellectual Property Protection Enablementchevron-right1.8 – Verify Boot Image Signature Validationchevron-right1.9 – Check Cryptographic PRNG Utilizationchevron-right
PreviousCCTVchevron-leftNext1.1 Test Secure Debug Interfaceschevron-right

Last updated 6 months ago