filmov
tv
Adventures in Embedded Device Exploration and Exploitation - Bobby Kuzma
![preview_player](https://i.ytimg.com/vi/380oIZxp3IM/maxresdefault.jpg)
Показать описание
Adventures in Embedded Device Exploration and Exploitation with Bobby Kuzma at NYC Cyber Security meetup at Black Rock NYC on Apr 13 2016
In this talk, we demonstrate techniques for analyzing embedded, network enabled devices for security vulnerabilities, and introduce the tools and methodologies for conducting effective security assessments on novel devices.
Bobby Kuzma is a CISSP, security geek,and retired IT consultant. If it processes data, he's probably tried to make it do bad things. He teaches, mentors, and explores (and occasionally explodes).. things. When not spelunking through the infosec underworld, Bobby is a systems engineer with Core Security Technologies.
EVENT PAGE
EVENT ORGANIZER
VENUE SPONSOR
VIDEO SPONSOR:
ABOUT OWASP:
The Open Web Application Security Project (OWASP) is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. Our mission is to make software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks.
#3169-03
In this talk, we demonstrate techniques for analyzing embedded, network enabled devices for security vulnerabilities, and introduce the tools and methodologies for conducting effective security assessments on novel devices.
Bobby Kuzma is a CISSP, security geek,and retired IT consultant. If it processes data, he's probably tried to make it do bad things. He teaches, mentors, and explores (and occasionally explodes).. things. When not spelunking through the infosec underworld, Bobby is a systems engineer with Core Security Technologies.
EVENT PAGE
EVENT ORGANIZER
VENUE SPONSOR
VIDEO SPONSOR:
ABOUT OWASP:
The Open Web Application Security Project (OWASP) is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. Our mission is to make software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks.
#3169-03