Using cloud implementations to hack IoT - Alex 'Jay' Balan

Поділитися
Вставка
  • Опубліковано 6 вер 2020
  • cfp.nonamecon.org/nnc2020/tal...
    www.slideshare.net/nonamecon/...
    Using cloud implementations to hack IoTs. A practical guide that works on multiple vendors
    Abstract (short): With all IoT vendors moving to cloud management, we felt it necessary to have a look at some of those implementations. In this talk, we'll showcase our latest findings on 4 popular vendors and their cloud implementations, starting with authentication bypasses, device tampering and even RCE relayed by the cloud and popping connect-back shells.
  • Наука та технологія

КОМЕНТАРІ •