Awesome IoT Hacks


Awesome IoT Hacks



Analysis, Reports and Slides
IoT Hacks

Analysis, Reports and Slides

Internet of Things Research Study (HP 2014 Report)
The Internet of Fails

Cameras, Thermostats, and Home Automation Controllers, Hacking 14 IoT Devices
Hack All The Things: 20 Devices in 45 Minutes - (wiki
Careful Connections: Building Security in the Internet of Things (FTC)

Secure Internet of Things Project (Stanford)
The Open Web Application Security Project (OWASP)

IoT Hacks


Proofpoint Uncovers Internet of Things (IoT) Cyberattack


Vulnerabilities in First-Generation RFID-enabled Credit Cards
MIT Subway Hack Paper Published on the Web
Tampered Card Readers Steal Data via Bluetooth

Home Automation

IOActive identifies vulnerabilities in Belkin WeMo’s Home Automation
Cameras, Thermostats, and Home Automation Controllers, Hacking 14 IoT Devices
Popular Home Automation System Backdoored Via Unpatched Flaw

Connected Doorbell

CVE-2015-4400: Backdoorbot, Network Configuration Leak on a Connected Doorbell, (video)


TWSL2013-023: Lack of Web and API AuthenticationVulnerability in INSTEON Hub

Smart Coffee

Reversing the Smarter Coffee IoT Machine Protocol to Make Coffee Using the Terminal


How I hacked my smart bracelet

Smart Plug

Hacking the D-Link DSP-W215 Smart Plug
Reverse Engineering the TP-Link HS110
Hacking Kankun Smart Wifi Plug
Smart Socket Hack Tutorial


Trendnet Cameras - I always feel like somebody’s watching me
Hacker Hotshots: Eyes on IZON Surveilling IP Camera Security
Cameras, Thermostats, and Home Automation Controllers, Hacking 14 IoT Devices
Hacker ‘shouts abuse’ via Foscam baby monitoring camera
Urban surveillance camera systems lacking security
TWSL2014-007: Multiple Vulnerabilities in Y-Cam IP Cameras
Say Cheese: a snapshot of the massive DDoS attacks coming from IoT cameras
Samsung SmartCam install.php Remote Root Command Exec

Traffic Lights

Green Lights Forever: Analyzing The Security of Traffic Infrastructure
Hacking US (and UK, Australia, France, etc.) Traffic Control Systems


Hackers Remotely Attack a Jeep on the Highway
Comprehensive Experimental Analyses of Automotive Attack Surfaces


Hackers could take control of a plane using in-flight entertainment system

Light Bulbs

Hacking into Internet Connected Light Bulbs
Hacking Lightbulbs: Security Evaluation Of The Philips Hue Personal Wireless Lighting System
IoT Goes Nuclear: Creating a ZigBee Chain Reaction
Extended Functionality Attacks on IoT Devices: The Case of Smart Lights


Lockpicking in the IoT

Smart Scale

Fitbit Aria Wi-Fi Smart Scale

Smart Meters

Solar Power Firm Patches Meters Vulnerable to Command Injection Attacks


Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses


Cameras, Thermostats, and Home Automation Controllers, Hacking 14 IoT Devices
Google Nest: Exploiting DFU For Root
Smart Nest Thermostat, A Smart Spy in Your Home
TWSL2013-022: No Authentication Vulnerability in Radio Thermostat


Proofpoint Uncovers Internet of Things (IoT) Cyberattack - Spam emails from fridges.
Hacking Defcon 23’S IoT Village Samsung Fridge

Media Player & TV

Breaking Secure-Boot on the Roku
Google TV Or: How I Learned to Stop Worrying and Exploit Secure Boot
Chromecast: Exploiting the Newest Device By Google
Ransomware Ruins Holiday By Hijacking Family’s LG Smart TV on Christmas Day

Rifle (Weapon)

Hacking a IoT Rifle - BlackHat 2015 - 36 slides
Hackers Can Disable a Sniper Rifle—Or Change Its Target - Wired 2015


TWSL2013-020: Hard-Coded Bluetooth PIN Vulnerability in LIXIL Satis Toilet


TWSL2013-021: Multiple Vulnerabilities in Karotz Smart Rabbit
Fisher-Price smart bear allowed hacking of children’s biographical data (CVE-2015-8269)
Hello Barbie Initial Security Analysis
Security researcher Ken Munro discovers vulnerability in Vivid Toy’s talking Doll ‘Cayla’
Data from connected CloudPets teddy bears leaked and ransomed, exposing kids’ voice messages

© 2017 物联网安全技术研究 All Rights Reserved. 本站访客数人次 本站总访问量
Theme by hiero