Главная
Study mode:
on
1
Introduction
2
Welcome
3
About me
4
Vulnerability research
5
Publishing
6
Reusable attack vectors
7
Authentication packets
8
Cloud implementations
9
Command injection
10
MQTT
11
MQTT Leak
12
RSTP Leak
13
Buffer Overflow
14
Cloud related attacks
15
Avoid highprofile brands
16
Vulnerability tracking
17
Policy changes
Description:
Explore a comprehensive retrospective on five years of IoT vulnerability research and numerous zero-day exploits presented at DefCamp 2021. Delve into topics such as reusable attack vectors, authentication packets, cloud implementations, command injection, MQTT and RSTP leaks, buffer overflow, and cloud-related attacks. Gain insights on vulnerability tracking, policy changes, and strategies for avoiding high-profile brands in IoT security research. Learn from hands-on experiences and practical approaches to identifying and addressing security vulnerabilities in the rapidly evolving Internet of Things landscape.

Years of IoT Vulnerability Research and Countless 0days - A Retrospective - DefCamp - 2021

DefCamp
Add to list