When IoT Attacks - Hacking a Linux-Powered Rifle

When IoT Attacks - Hacking a Linux-Powered Rifle

Black Hat via YouTube Direct link

Recon

9 of 26

9 of 26

Recon

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

When IoT Attacks - Hacking a Linux-Powered Rifle

Automatically move to the next video in the Classroom when playback concludes

  1. 1 When lot Attacks: Hacking A Linux-Powered Rifle
  2. 2 Tracking Point TP750
  3. 3 Tag Track Xact (TTX)
  4. 4 Things to keep in mind
  5. 5 The scope
  6. 6 Portscan
  7. 7 Mobile apps
  8. 8 Tracking Point app
  9. 9 Recon
  10. 10 Public API
  11. 11 Round I findings, part II
  12. 12 From Tracking Point's website
  13. 13 Tearing it open
  14. 14 UART
  15. 15 Round Il findings
  16. 16 Let's get destructive!
  17. 17 The real filesystem
  18. 18 System backend
  19. 19 Demo: normal operation
  20. 20 Demo: you missed!
  21. 21 Software updates
  22. 22 Demo: got root?
  23. 23 Demo: remote code execution
  24. 24 It's not all bad
  25. 25 Will it get better?
  26. 26 Vendors should level up

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.