Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore network exploitation techniques in IoT ecosystems through this GrrCON 2019 conference talk by Fotios "ithilgore" Chantzis. Delve into the vulnerabilities of various network protocols, including Multicast DNS, IPP, and RTSP. Learn about fundamental flaws in IoT device communication, MDNS poisoning, neighbor cache posing, and common vulnerabilities in IP cameras and medical devices. Gain insights into embedded malware and discover valuable resources for further research on IoT security.