Exploring Ethical Hacking by Identifying Vulnerabilities in Motorola BabyMonitor MBP855CONNECT(4855)

University essay from KTH/Medicinteknik och hälsosystem

Author: Martin Hilding; Mattias Nordström; [2021]

Keywords: ;

Abstract: As IoT is implemented into more of our daily-use devices, so too should the understanding of potential risks caused by interconnectivity. Securing an IoT device is no simple feat, it is therefore important to understand the complexities of cyber security.   This thesis has itemized the basics of IoT penetration testing using the Motorola MBP855CONNECT as an example device. The thesis includes a basic theoretical introduction to ethical hacking, coupled with the exploration of a few fundamental penetration testing techniques described in the STRIDE threat modeling framework. These threats consists of spoofing, tampering, repudiation, information disclosure, denial of service, and escalation of privilege. No significant vulnerabilities were found in this example.

  AT THIS PAGE YOU CAN DOWNLOAD THE WHOLE ESSAY. (follow the link to the next page)