Yet Another IoT Hack

Posted on in Presentations

A presentation and explanation on how to discover and exploit security vulnerabilities in embedded devices. This session will include a live demonstration of exploits discovered through independent research and how a novice researcher might find similar vulnerabilities in other devices.

Learning Objectives:
1: Understand how to perform security research on embedded devices.
2: Understand the impact of insecure embedded devices.
3: Learn basic security concepts and exploits.

Knowledge of standard UNIX tools and HTTP fundamentals.

Mobile & IoT Security Hackers & Threats

zero day vulnerability security awareness Internet of Things exploit of vulnerability



Share With Your Community