Speaker: Thomas Wilhelm Sr. Network & Information Security Engineer; Adjunct Processor
There has been plenty of news about hacking into the iPod Touch, but what about using the iTouch as a hacking platform? This talk will discuss how to convert the iTouch into a PenTest device, describe available tools, and talk about potential uses for the iTouch as a social engineering tool to provide unauthorized access within a target network. We will also see real-world examples of the device in action against vulnerable systems.embedded by Embedded Video
YouTube Direkt
via koresecure.com
No comments:
Post a Comment