A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Hacking the IoT: A Case Study - Nancy Meares Snoke and Phoenix Snoke NolaCon 2017 (Hacking Illustrated Series InfoSec Tutorial Videos)

Hacking the IoT: A Case Study
Nancy Meares Snoke and Phoenix Snoke
@NancySnoke

An IoT device is made up of 5 different components: the hardware, webapp, mobile apps, network communication and API. Hacking an IoT device requires looking at each component individually, as well as looking at the whole picture. In this talk, husband and wife team -- Nancy and Phoenix Snoke -- go through the process and findings of hacking an actual IoT device: a baby monitor. Both general methodology and specific examples will be presented. This talk concludes with tips for setting up your own IoT device hacking lab. Note: the detail level of the findings and whether the exact device model will be released is dependent on a response pending from manufacturer.

Nancy and Phoenix currently run their own cyber security consultant firm, MagickSecurity LLC. In the past, Nancy has been Senior Software Engineer at PGAC responsible for web application security, and a penetration tester for Cisco Systems. Nancy has prevoiusly spoken at Derbycon and NOLACON. She got her undergraduate degree in Computer Engineering at Tulane University in New Orleans, and her Masters in Computer Science at University of Illinois Urbana-Champaign. Phoenix wishes to remain a mystery to the audience.

Recorded at NolaCon 2017

Back to NolaCon 2017 video list

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast