Posted on
in Presentations
A presentation and explanation on how to discover and exploit security vulnerabilities in embedded devices. This session will include a live demonstration of exploits discovered through independent research and how a novice researcher might find similar vulnerabilities in other devices.
Learning Objectives:
1: Understand how to perform security research on embedded devices.
2: Understand the impact of insecure embedded devices.
3: Learn basic security concepts and exploits.
Pre-Requisites:
Knowledge of standard UNIX tools and HTTP fundamentals.
Learning Objectives:
1: Understand how to perform security research on embedded devices.
2: Understand the impact of insecure embedded devices.
3: Learn basic security concepts and exploits.
Pre-Requisites:
Knowledge of standard UNIX tools and HTTP fundamentals.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community