Focus on remotely exploitable bugs
çYes, local network attacks are cool, but this wasn’t the focus of my research
çTwo types of remote attacks:
¼Classic server-side attack: no interaction required from victim user. Probe daemon on device directly
¼New generation victim-user-to-server attack: target daemon only available on LAN interface. Exploit relies internal user as a proxy to attack device from inside the network
ç