sudoninja book
Ctrlk
  • sudoninja book
  • About us
  • Security Area
    • Penetration Testing Methodologies
    • How to Find CVE
    • DAST/SAST
    • Penetration-Testing
    • Web Application Penetration Testing
    • Network Penetration Testing
    • Mobile Penetration testing
    • Active Directory penetration testing
    • API Penetration Testing
    • Source Code Review
    • CTF
    • IOT Penetration Testing
      • Methodology
        • CCTV
          • 1.Hardware Level Security Parameter
          • 2.Software/Firmware
            • 2.1 Verify Memory Protection Mechanisms
            • 2.2 Test Firmware Data-in-Transit Security
            • 2.3 Test Server Connection Signature Validation
            • 2.4 – Check for Safe Alternatives to Banned C Functions
            • 2.5 Validate Firmware Software Bill of Materials (SBOM)
            • 2.6 – Audit Code for Hardcoded Credentials
            • 2.7a – Test Firmware Digital Signature Pinning
            • 2.7b Assess Firmware Reverse Engineering Protections
            • 2.8 Evaluate Firmware Update Security
            • 2.9 Confirm Device Code Signing and Validation
            • 2.10 – Test Anti-Rollback Firmware Protection:
            • 2.11 – Verify Scheduled Firmware Update
          • 3.Secure Process Conformance
          • 4. Security Conformance at Product Development Stage
      • Cheat sheet
      • Book
      • Mind Map
      • Check list
      • Blog
      • Video
      • Report
      • Tool
      • Vulnerable IoT Labs
    • Red Teaming
    • Cloud Security
    • Bug Bounty Hunting
    • Thick Client Pentesting
    • Malware Analysis
    • DevSecOps
    • Wireless Penetration Testing
    • LLM penetration Testing
  • Practice and improve skills
  • list of Vulnerabilities-1
  • list of Vulnerabilities-2
  • Tool
  • Note
  • AWAE/OSWE
  • Burp Suite Certified Practitioner
  • Pentesting Bible
  • Free Certification
  • Hack The Box
  • Bookmark
  • Report
  • Lab
  • Framework
  • CheatSheet
  • Mind Map
  • Certifications
  • Research Tool
  • Learn for Fun
  • POST
Powered by GitBook
On this page

Was this helpful?

  1. Security Area
  2. IOT Penetration Testing
  3. Methodology
  4. CCTV

2.Software/Firmware

2.1 Verify Memory Protection Mechanisms2.2 Test Firmware Data-in-Transit Security2.3 Test Server Connection Signature Validation2.4 – Check for Safe Alternatives to Banned C Functions2.5 Validate Firmware Software Bill of Materials (SBOM)2.6 – Audit Code for Hardcoded Credentials2.7a – Test Firmware Digital Signature Pinning2.7b Assess Firmware Reverse Engineering Protections2.8 Evaluate Firmware Update Security2.9 Confirm Device Code Signing and Validation2.10 – Test Anti-Rollback Firmware Protection:2.11 – Verify Scheduled Firmware Update
PreviousTest 1-2Next2.1 Verify Memory Protection Mechanisms

Was this helpful?