Why “and beyond”?: exploit features creatively
çExploit features supported by target device for your own good. i.e.:
¼if IP camera is compromised, then replace the video stream to bypass surveillance controls! (will be demoed at end of presentation)
¼Write script that calls the ping diagnostic tool automatically in order to map the internal network [link]
¼Phish admin pass via Dynamic DNS poisoning Dynamic DNS [link]
●
ç