How are attackers taking advantage of embedded systems? In this session the presenter will use opensource and embedded devices to bypass firewalls, pivot across network boundaries and gain full access to systems few consider computers. He will demonstrate “tube”, a reverse SOCKS proxy with a built-in TTY shell, designed to be stealthy on the network and work on the tiniest of embedded systems.
Hackers & Threats Open Source Tools
exploit of vulnerability network security remote access network access control
Share With Your Community