sudoninja book
search
Ctrlk
  • sudoninja book
  • About us
  • Security Areachevron-right
    • Penetration Testing Methodologieschevron-right
    • How to Find CVEchevron-right
    • DAST/SAST
    • Penetration-Testingchevron-right
    • Web Application Penetration Testingchevron-right
    • Network Penetration Testingchevron-right
    • Mobile Penetration testingchevron-right
    • Active Directory penetration testingchevron-right
    • API Penetration Testingchevron-right
    • Source Code Reviewchevron-right
    • CTFchevron-right
    • IOT Penetration Testingchevron-right
      • Methodologychevron-right
        • CCTVchevron-right
          • 1.Hardware Level Security Parameterchevron-right
            • 1.1 Test Secure Debug Interfaceschevron-right
            • 1.2 Verify Unique Cryptographic Keys and Certificateschevron-right
            • 1.3 Test On-Chip Debug Interface Securitychevron-right
            • 1.4 Test Trusted Execution Implementationchevron-right
            • 1.5 – Verify Secure Storage of Sensitive Datachevron-right
            • 1.6 – Check Tamper Resistance Featureschevron-right
            • 1.7 – Test Intellectual Property Protection Enablementchevron-right
            • 1.8 – Verify Boot Image Signature Validationchevron-right
            • 1.9 – Check Cryptographic PRNG Utilizationchevron-right
          • 2.Software/Firmwarechevron-right
          • 3.Secure Process Conformancechevron-right
          • 4. Security Conformance at Product Development Stagechevron-right
      • Cheat sheet
      • Book
      • Mind Map
      • Check list
      • Blog
      • Video
      • Report
      • Tool
      • Vulnerable IoT Labs
    • Red Teamingchevron-right
    • Cloud Securitychevron-right
    • Bug Bounty Huntingchevron-right
    • Thick Client Pentestingchevron-right
    • Malware Analysis
    • DevSecOps
    • Wireless Penetration Testingchevron-right
    • LLM penetration Testingchevron-right
  • Practice and improve skills
  • list of Vulnerabilities-1chevron-right
  • list of Vulnerabilities-2chevron-right
  • Toolchevron-right
  • Note
  • AWAE/OSWEchevron-right
  • Burp Suite Certified Practitionerchevron-right
  • Pentesting Bible
  • Free Certification
  • Hack The Box
  • Bookmark
  • Report
  • Labchevron-right
  • Frameworkchevron-right
  • CheatSheet
  • Mind Map
  • Certifications
  • Research Tool
  • Learn for Funchevron-right
  • POSTchevron-right
  • pentest road map
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Security Areachevron-right
  2. IOT Penetration Testingchevron-right
  3. Methodologychevron-right
  4. CCTV

1.Hardware Level Security Parameter

1.1 Test Secure Debug Interfaceschevron-right1.2 Verify Unique Cryptographic Keys and Certificateschevron-right1.3 Test On-Chip Debug Interface Securitychevron-right1.4 Test Trusted Execution Implementationchevron-right1.5 – Verify Secure Storage of Sensitive Datachevron-right1.6 – Check Tamper Resistance Featureschevron-right1.7 – Test Intellectual Property Protection Enablementchevron-right1.8 – Verify Boot Image Signature Validationchevron-right1.9 – Check Cryptographic PRNG Utilizationchevron-right
PreviousCCTVchevron-leftNext1.1 Test Secure Debug Interfaceschevron-right

Last updated 5 months ago

Was this helpful?

Was this helpful?