O'Reilly logo

IoT Penetration Testing Cookbook by Aditya Gupta, Aaron Guzman

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

How to do it...

For this recipe, we will work with Microsoft's Threat Modeling Tool as it's quite simple to draw network diagrams with:

  1. Start Microsoft's Threat Modeling Tool 2016. Select the Create A Model option:
  1. Get familiar with the Stencils the tool provides to demonstrate devices, transport communication, as well as trust boundaries for inputs and outputs. Microsoft does provide a user guide on the different Stencils and options when the tool is downloaded although it is not required reading:
As of the 2016 version of Microsoft's Threat Modeling Tool, custom templates, and Stencils can be created to correlate threats more accurately. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required