Download pdf
Most known IoT botnets harvest zombies through telnet with hardcoded or weak credentials. The next step will be exploiting other, more evolved vulnerabilities that can provide control over a large number of devices. This talk will take a glimpse into that future showing our research on a remote code execution vulnerability that affects the firmware present in more than 175,000 devices worldwide.

Learning Objectives:
1: Understand IoT vulnerability research.
2: See why IoT security research is a low hanging fruit that more people should do.
3: Learn why mass hacking of smart devices is quite trivial today.