sudoninja book
search
Ctrlk
  • sudoninja book
  • About us
  • Security Areachevron-right
    • Penetration Testing Methodologieschevron-right
    • How to Find CVEchevron-right
    • DAST/SAST
    • Penetration-Testingchevron-right
    • Web Application Penetration Testingchevron-right
    • Network Penetration Testingchevron-right
    • Mobile Penetration testingchevron-right
    • Active Directory penetration testingchevron-right
    • API Penetration Testingchevron-right
    • Source Code Reviewchevron-right
    • CTFchevron-right
    • IOT Penetration Testingchevron-right
      • Methodologychevron-right
        • CCTVchevron-right
          • 1.Hardware Level Security Parameterchevron-right
          • 2.Software/Firmwarechevron-right
            • 2.1 Verify Memory Protection Mechanismschevron-right
            • 2.2 Test Firmware Data-in-Transit Securitychevron-right
            • 2.3 Test Server Connection Signature Validationchevron-right
            • 2.4 – Check for Safe Alternatives to Banned C Functionschevron-right
            • 2.5 Validate Firmware Software Bill of Materials (SBOM)chevron-right
            • 2.6 – Audit Code for Hardcoded Credentialschevron-right
            • 2.7a – Test Firmware Digital Signature Pinningchevron-right
            • 2.7b Assess Firmware Reverse Engineering Protectionschevron-right
            • 2.8 Evaluate Firmware Update Securitychevron-right
            • 2.9 Confirm Device Code Signing and Validationchevron-right
            • 2.10 – Test Anti-Rollback Firmware Protection:chevron-right
            • 2.11 – Verify Scheduled Firmware Updatechevron-right
          • 3.Secure Process Conformancechevron-right
          • 4. Security Conformance at Product Development Stagechevron-right
      • Cheat sheet
      • Book
      • Mind Map
      • Check list
      • Blog
      • Video
      • Report
      • Tool
      • Vulnerable IoT Labs
    • Red Teamingchevron-right
    • Cloud Securitychevron-right
    • Bug Bounty Huntingchevron-right
    • Thick Client Pentestingchevron-right
    • Malware Analysis
    • DevSecOps
    • Wireless Penetration Testingchevron-right
    • LLM penetration Testingchevron-right
  • Practice and improve skills
  • list of Vulnerabilities-1chevron-right
  • list of Vulnerabilities-2chevron-right
  • Toolchevron-right
  • Note
  • AWAE/OSWEchevron-right
  • Burp Suite Certified Practitionerchevron-right
  • Pentesting Bible
  • Free Certification
  • Hack The Box
  • Bookmark
  • Report
  • Labchevron-right
  • Frameworkchevron-right
  • CheatSheet
  • Mind Map
  • Certifications
  • Research Tool
  • Learn for Funchevron-right
  • POSTchevron-right
  • pentest road map
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Security Areachevron-right
  2. IOT Penetration Testingchevron-right
  3. Methodologychevron-right
  4. CCTV

2.Software/Firmware

2.1 Verify Memory Protection Mechanismschevron-right2.2 Test Firmware Data-in-Transit Securitychevron-right2.3 Test Server Connection Signature Validationchevron-right2.4 – Check for Safe Alternatives to Banned C Functionschevron-right2.5 Validate Firmware Software Bill of Materials (SBOM)chevron-right2.6 – Audit Code for Hardcoded Credentialschevron-right2.7a – Test Firmware Digital Signature Pinningchevron-right2.7b Assess Firmware Reverse Engineering Protectionschevron-right2.8 Evaluate Firmware Update Securitychevron-right2.9 Confirm Device Code Signing and Validationchevron-right2.10 – Test Anti-Rollback Firmware Protection:chevron-right2.11 – Verify Scheduled Firmware Updatechevron-right
PreviousTest 1-2chevron-leftNext2.1 Verify Memory Protection Mechanismschevron-right

Was this helpful?

Was this helpful?