çYes, local network
attacks are cool, but this wasn’t the focus of my research
çTwo
types of remote attacks:
¼Classic server-side attack: no
interaction required from victim user. Probe daemon on device
directly
¼New
generation victim-user-to-server attack: target daemon only available on LAN
interface. Exploit relies internal user as a proxy to attack device from inside the
network
ç