A presentation and explanation on how to discover and exploit security vulnerabilities in embedded devices. This session will include a live demonstration of exploits discovered through independent research and how a novice researcher might find similar vulnerabilities in other devices.
Learning Objectives: 1: Understand how to perform security research on embedded devices. 2: Understand the impact of insecure embedded devices. 3: Learn basic security concepts and exploits.
Pre-Requisites: Knowledge of standard UNIX tools and HTTP fundamentals.