We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

IoT Village - Next gen IoT Botnets 3 moar ownage

Formal Metadata

Title
IoT Village - Next gen IoT Botnets 3 moar ownage
Title of Series
Number of Parts
335
Author
Contributors
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Traditional IoT botnets operate pretty much like shooting fish in a barrel. With an elephant gun. A service running on a port. A weak password or a lame vulnerability and you've got yourself a few hundred thousand zombies. This "space", however, is getting crowded and botnet masters will start looking for alternatives. This talk will show one of the possible futures - leveraging cloud platforms to mass hack hundreds of thousands of devices. We'll start with a quick 'n dirty crash course for those just getting started with IoT hacking, a brief glimpse into the current status of IoT botnets and get down to business with showing our research on a few popular IoT brands with demos for each finding. Worth mentioning that some of the vulnerabilities haven't been patched at the time of this submission (6 months after our initial report to the vendor) so odds are that we'll be popping some connect-back shells from cameras behind NAT live, on stage.