- Hacking IoT
- Hardware Based
- Memory Dump
- Chip Off
- Full Version
The security of Internet of Things (IoT) is becoming a hot topic, but this talk is not a typical IoT presentation. It will discuss and demonstrate in-depth research and a solid forensics approach including data, account information and configuration retrieval from IoT devices like routers, IP cameras or Smart TVs.
Wikileaks revealed a new CIA wireless pentesting tool called “Cherry Blossom” which could allow for remotely compromising network devices using MITM attacks, however only a short portion of the report discussed actual hardware hacks. We have been looking into these attacks a year before the WikiLeaks reveal, and have much more to add on the physical testing of the listed routers. We will demonstrate how to obtain privilege of and gain access control as well as access to the firmware and configuration files of the devices mentioned.
Learn all the basics of generating procedural mesh using C#
Step-by-step walkthrough of the optimal template for selling investment banking and financial services products
About the instructors
- 2.97 Calificación
- 6683 Estudiantes
- 3 Cursos
Hardware Analysis and Research
Kelvin is independent researcher and recognised as the honoree of ISLA APAC in 2016. With more than 10 years experience in forensics field as a practice lead in cyber forensic, he is well-recognized for his expert ability to investigate cyber crime based upon sound detective methodology and gave opinions at the Court as an Expert Witness. He is the only Asian speaker standing at the stage of the top 3 forensics conferences: HTCIA US, SANS DFIR Summit and DFRWS EU; and published researches in different famous computer security conference like DEFCON, HITB, HITCON, AVTokyo, ISC2 APAC. He is also the workshop trainer in CodeBlue and HITCON.
This has lots of knowledge. But need some pre knowledge to understand. Overall this is really helpful lecturer
I'm trying to characterize different hardware platforms based on how their architecture will help us execute different security and computing algorithms
Lean much of hardware hacking, awesome