Posted on
in Presentations
How are attackers taking advantage of embedded systems? In this session the presenter will use opensource and embedded devices to bypass firewalls, pivot across network boundaries and gain full access to systems few consider computers. He will demonstrate “tube”, a reverse SOCKS proxy with a built-in TTY shell, designed to be stealthy on the network and work on the tiniest of embedded systems.
Share With Your Community