esib_iot_challenge
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | Next revisionBoth sides next revision | ||
esib_iot_challenge [2017/05/17 22:35] – [3. Devices] samer | esib_iot_challenge [2017/05/17 22:44] – [4. Applications] samer | ||
---|---|---|---|
Line 119: | Line 119: | ||
* What are the possible strengths and weaknesses in terms of security of MQTT? | * What are the possible strengths and weaknesses in terms of security of MQTT? | ||
* What are the different types of topics used by the backend? Explain. | * What are the different types of topics used by the backend? Explain. | ||
- | * Explain the different fields in a captured MQTT message received from you device. | + | * Explain the different fields in a captured MQTT message received from you device. |
</ | </ | ||
+ | |||
+ | <WRAP left round tip 100%> | ||
+ | The payload received by the MQTT client is decrypted but encoded in Base64. You should decode it to get the original message. | ||
+ | </ | ||
+ | |||
===== -. The End-to-End Challenge ===== | ===== -. The End-to-End Challenge ===== | ||
esib_iot_challenge.txt · Last modified: 2021/08/28 09:53 by samer