Final Seminar - Report
Final Seminar - Report
Final Seminar - Report
A SEMINAR REPORT
ON
“IOT Device Penetration Testing”
Submitted in the partial fulfillment for the award of Bachelor of Engineering
degree in Computer Science & Engineering
Submitted By
AMRUTH J (4AD20CS401)
Mrs. Indu J
Associate Professor,
Dept. of Computer Science &Engg.
ATME College of Engineering,
Mysuru-570028
CERTIFICATE
This is to certify that the Seminar Work entitled “IOT Device Penetration Testing” is the
bonafide work carried out by Amruth J (4AD20CS401) in partial fulfillment for the award of
degree of Bachelor of Engineering in Computer Science and Engineering from Visvesvaraya
Technological University, Belagavi during the year 2022-2023.
The successful completion of my work would be incomplete without the mention of the
names of the people who have made it possible. I am indebted to several individuals who have
helped me to complete the report.
Lastly, I thank almighty, parents and friends for their constant encouragement and
support, for helping me in completing the seminar successfully.
Amruth J (4AD20CS401)
ABSTRACT
The Internet of Things (IoT) is increasingly becoming incorporated into everyday life and we
could argue that this area of computing is changing our lives for the better. We now have technology
that is able to aid us in our everyday, sometimes hectic, lifestyle and make it easier for us to go about
our day. However, not many people may know that with this new technology comes its risks and
security issues. This project aimed to identify just some of the vulnerabilities that are apparent in loT
devices with the aim of better informing the public about the dangers of lot weaknesses. Results
revealed that issues identified in the loT device were able to be exploited using a series of tools and
were able to cause disruption and possible data breaches. Suggestions for increasing the security of
users' devices against these attacks are discussed when evaluating the project.
TABLE OF CONTENTS
1. Acknowledgment
2. Abstract
3. Introduction 1
4. Background 2
Internet of Things
IOT top 10
5. Approach 9
Network Security
Deauthentication Attack
7. Conclusion 36
8. References 37
LIST OF FIGURES