We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Kinectasploit: Metasploit Meets Kinect

00:00

Formal Metadata

Title
Kinectasploit: Metasploit Meets Kinect
Title of Series
Number of Parts
122
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
We've all seen hackers in movies flying through 3D worlds as they hack the gibson. How about trying it for real? Now that we've got the kinect, lets hook it up to some hacking tools and see what it looks like to hack via kinect! Jeff Bryner has 20 years of experience integrating systems, fixing security issues, performing incident response and forensics. He writes for the SANS forensic blog, has spoken at RSA on SCADA security issues, DEFCON 18 on the google toolbar and runs p0wnlabs.com just for fun. Twitter: @p0wnlabs
Demo (music)Slide ruleIntegrated development environmentCuboidConnected spaceGame theoryTrailPhysicalismSkeleton (computer programming)First-person shooterCodeMultiplication signProgrammer (hardware)WhiteboardVideo gameInternetworkingYouTubePoint cloudReal-time operating systemContext awarenessProjective planeWrapper (data mining)Computer animationBeat (acoustics)Lecture/Conference
Term (mathematics)Computer animationPhysicalismReal-time operating systemSoftware developerYouTubeWebsiteReal numberGame theoryFront and back endsFrame problem2 (number)Computing platformIntegrated development environmentCombinational logicVideo gameComputer animation
Skeleton (computer programming)Connected spaceInternetworkingCommunications protocolStreaming mediaOpen setGame controllerComputer programmingLine (geometry)Lecture/Conference
Computational complexity theoryNumberStreaming mediaVariety (linguistics)Coordinate systemLecture/Conference
Lie groupDemo (music)Series (mathematics)VolumenvisualisierungInternetworkingOpen sourceFigurate numberElectronic visual displayMappingMereologyPolygon meshCASE <Informatik>Cycle (graph theory)Computer animation
Civil engineeringConvex hullFirst-person shooterDisk read-and-write headHydraulic jumpBasis <Mathematik>Connected spaceArmInternet forumDemo (music)Integrated development environmentDegree (graph theory)Game theoryReal-time operating systemElectronic visual displayLecture/Conference
CuboidCASE <Informatik>Integrated development environmentRight angleIP addressWave packetVideo game consoleFunction (mathematics)Electronic visual displayDemosceneNeuroinformatikHorizonInheritance (object-oriented programming)Skeleton (computer programming)MappingConnected spaceLocal ringHost Identity ProtocolComputer animation
Interpreter (computing)Module (mathematics)Real numberInterface (computing)Function (mathematics)FeedbackVideo game consoleLevel (video gaming)First-person shooterTranslation (relic)Mixture modelWordArmRing (mathematics)CuboidNeuroinformatikProcess (computing)Row (database)Range (statistics)
Transcript: English(auto-generated)