Request a Demo Contact Us
Bugcrowd Acquires Informer to Enhance Offerings Across Attack Surface Management and Penetration Testing
Learn More

IoT – Attacker Point of View

 

This talk will review the most famous vulnerabilities encountered during pentest and audit. From the OWASP IoT Top10, we will attack many device to illustrate each vulnerabilities. On each attack, we will see methodology and tool usage to exploit. The main goal is to provide to designers and makers all needed security reflex before pushing a device to production and provide to attackers a cheaper way to challenge security and find cool things.

More resources

Report

Scopes: Where Bigger is Better

Read More
Report

Inside the Mind of a CISO

Read More
Report

The Total Economic Impact™ Of Bugcrowd Managed Bug Bounty

Read More

Get Started with Bugcrowd

Every minute that goes by, your unknown vulnerabilities leave you more exposed to cyber attacks.