Abstract. This writeup is a basic introduction on how to setup a basic Man-in-the-Middle scenario for IOT as well as other mobile devices and common pitfalls that can occur during such an assessment. Furthermore, the discovery of a permanent Denial-of-Service vulnerability, due to an unencrypted firmware update process, will be described. Intro. Recently, I stumbled […]