Cracking into embedded
devices and beyond!
Practical overview of offensive techniques against embedded devices