Tech level required: Intermediate-high (we’ll talk about command injection, buffer overflows, misuse of ASLR, packet captures)
How many 0days can a research team discover in 5 years of vulnerability research in IoT? How many of them are relevant and can be used even today? How to get started (or advance further) with IoT vulnerability research? This talk will answer all these questions and show you some hands-on shell-popping and authentication bypasses as well as some new 0days that we published this year.