Cargando…
Hacking IoT - from zero to remote shell
<!--HTML-->A walk-through on how to exploit an IoT device to gain a remote shell.
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
2021
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/2792178 |
_version_ | 1780972344672518144 |
---|---|
author | Fischer, Daniel |
author_facet | Fischer, Daniel |
author_sort | Fischer, Daniel |
collection | CERN |
description | <!--HTML-->A walk-through on how to exploit an IoT device to gain a remote shell. |
id | cern-2792178 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2021 |
record_format | invenio |
spelling | cern-27921782022-11-02T22:02:00Z http://cds.cern.ch/record/2792178 eng Fischer, Daniel Hacking IoT - from zero to remote shell IT Lightning Talks: session #21 IT Lightning Talks (ITLT) <!--HTML-->A walk-through on how to exploit an IoT device to gain a remote shell. 2021 |
spellingShingle | IT Lightning Talks (ITLT) Fischer, Daniel Hacking IoT - from zero to remote shell |
title | Hacking IoT - from zero to remote shell |
title_full | Hacking IoT - from zero to remote shell |
title_fullStr | Hacking IoT - from zero to remote shell |
title_full_unstemmed | Hacking IoT - from zero to remote shell |
title_short | Hacking IoT - from zero to remote shell |
title_sort | hacking iot - from zero to remote shell |
topic | IT Lightning Talks (ITLT) |
url | http://cds.cern.ch/record/2792178 |
work_keys_str_mv | AT fischerdaniel hackingiotfromzerotoremoteshell AT fischerdaniel itlightningtalkssession21 |