IoT – Attacker Point of View

This talk will review the most famous vulnerabilities encountered during pentest and audit. From the OWASP IoT Top10, we will attack many device to illustrate each vulnerabilities. On each attack, we will see methodology and tool usage to exploit. The main goal is to provide to designers and makers all needed security reflex before pushing a device to production and provide to attackers a cheaper way to challenge security and find cool things. @vulcainreo
Arnaud Courty
Back by Popular Demand, Join us at Mayhem at the Mint on Tuesday, March 5th, 2019!Register Today