While doing penetration testing there are scenarios in which we need to dump the firmware from the devices.This method is typically used when there are no firmware’s available from vendor site. Today we are going to show you how to dump the firmware from an…
Category: IOT

IOT Communication Protocols
Today we are going to discuss on types of communication protocols used in IOT devices and also its security aspects. What is the internet of things..? Internet of Things is nothing but the device which is connected with internet and sharing or receiving the data…