Cracking into embedded
 devices and beyond!
Practical overview of offensive techniques against embedded devices