The "Internet of Things" marketplace has been blowing up recently, and towards the end of last year we began seeing a lot of demand for security assessments of these types of platforms. To practice, we wanted to reverse engineer a consumer platform from scratch and look around for security vulnerabilities. What follows is the first of a three-part series on what we were able to do with the Dropcam. Through this research, we found the Dropcam has a pretty solid security model, so no 0day in this post. That being said, this type of reversing work is the most important prerequisite for finding security vulnerabilities, so we thought it would be great to share our findings and techniques with the security and reverse engineering communities.
read more here.....http://blog.includesecurity.com/2014/03/Reverse-Engineering-Dropcam-Communications.html
read more here.....http://blog.includesecurity.com/2014/03/Reverse-Engineering-Dropcam-Communications.html