Главная
Study mode:
on
1
Introduction
2
The device
3
The file system
4
The firmware
5
The exploit
6
Impact
Description:
Explore the vulnerabilities of IoT-CCTV devices in this 22-minute conference talk from TROOPERS18/NGI18. Delve into the intricacies of device security, file systems, and firmware as speaker Robert Kugler demonstrates the process of exploiting these systems. Gain insights into the potential impact of such vulnerabilities and understand the importance of securing IoT devices in the modern connected world.

Are You Sure - You Are Alone? Pwning IoT-CCTV Devices!

WEareTROOPERS
Add to list
0:00 / 0:00