çExploit features
supported by target device for your own good. i.e.:
¼if
IP camera is compromised, then replace the video stream to bypass
surveillance controls! (will be demoed at end of presentation)
¼Write script that calls the ping
diagnostic tool automatically in order to map the internal
network [link]
¼Phish admin pass via Dynamic DNS poisoning Dynamic DNS [link]
●
ç