We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Kinectasploit: Metasploit Meets Kinect

Formal Metadata

Title
Kinectasploit: Metasploit Meets Kinect
Title of Series
Number of Parts
122
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date2013
LanguageEnglish

Content Metadata

Subject Area
Genre
Abstract
We've all seen hackers in movies flying through 3D worlds as they hack the gibson. How about trying it for real? Now that we've got the kinect, lets hook it up to some hacking tools and see what it looks like to hack via kinect! Jeff Bryner has 20 years of experience integrating systems, fixing security issues, performing incident response and forensics. He writes for the SANS forensic blog, has spoken at RSA on SCADA security issues, DEFCON 18 on the google toolbar and runs p0wnlabs.com just for fun. Twitter: @p0wnlabs