Posted on
in Presentations
Most known IoT botnets harvest zombies through telnet with hardcoded or weak credentials. The next step will be exploiting other, more evolved vulnerabilities that can provide control over a large number of devices. This talk will take a glimpse into that future showing our research on a remote code execution vulnerability that affects the firmware present in more than 175,000 devices worldwide.
Learning Objectives:
1: Understand IoT vulnerability research.
2: See why IoT security research is a low hanging fruit that more people should do.
3: Learn why mass hacking of smart devices is quite trivial today.
Learning Objectives:
1: Understand IoT vulnerability research.
2: See why IoT security research is a low hanging fruit that more people should do.
3: Learn why mass hacking of smart devices is quite trivial today.
Share With Your Community