Internet of Things

IoT Security – What, Why and How – Internet of Things

IoT Security is a key factor to implement in today’s world. The amount of IoT devices in today’s world is just overwhelming. Everywhere we go, we see an IoT device...

How to stay secure as an IoT Device user – an actionable guide

If you are an IoT device user, chances are that your device is riddled with numerous security issues. This post teaches you on how to stay secure if you are an end consumer with...

Hacking IoT devices with the FREE Attify Badge tool

Welcome to another blog post by Attify – your source for all security and pentesting tips and techniques for IoT devices and mobile applications. In this post, we would like...

Exploiting IoT enabled BLE smart bulb security

With the growing popularity of IoT and smart devices, the first thing that comes to mind when talking about IoT is smart homes. This includes a whole bunch of devices including...

Zigbee security and exploitation for IoT devices

While working on our training material for the Offensive IoT Exploitation course, we here at Attify did a ton of in-depth research into all the possible aspects of IoT devices....

Introduction to Attify Badge : Hacking IoT hardware

Welcome to the new blog post by Attify. In this blog post, we will introduce our newest creation – Attify Badge, something which we use in order to perform hardware...

Emulating and Exploiting Firmware binaries

Welcome to the third post in the “Offensive IoT Exploitation” series. In the previous one, we learned about how we can get started with analyzing firmware and extracting file...

Firmware Analysis for IoT Devices

This is the second post in the IoT Exploitation and Penetration Testing series. In this post, we are going to have a look at a key component in an IoT device architecture –...

Getting started with “IoT Security” – Mapping the attack surface

IoT or the Internet of Things is the new buzzword all around. However, not enough attention has been paid to the security aspect of these so-called “smart” devices. This...

Securing your “smart” printer

When you think of the ways in which a computer network is penetrated, a printer is not the first thing that comes to mind. Most of the employees in an organisation will have their...