IoT Bug Hunting: From Shells to Responsible Disclosure


Posted on in Presentations

Internet of things (IoT) have always been vulnerable. This study proved that security controls put in place by device manufacturers are insufficient against attacks carried out by remote adversaries. This talk will summarize some of the best stories from the research project aimed to uncover and leverage new techniques to circumvent these new security controls in embedded devices.

Pre-Requisites: General familiarity with what IoT devices are and a cursory understanding of HTTP, network traffic analysis, *NIX shell command execution, DNS resolution, and basic web application vulnerabilities.


Participants
Ian Sindermann

Participant

Associate Security Analyst 2, Independent Security Evaluators

Shaun Mirani

Participant

Security Analyst, Independent Security Evaluators

Mobile & IoT Security DevSecOps & Application Security

secure coding Internet of Things exploit of vulnerability application security


Topic

Subtopic


Share With Your Community