Overview
This course aims to provide insights into the latest research and practices in the field of Hacking & Information Security, specifically focusing on IoT devices. The course covers topics such as the evolution of hacking techniques, zero-day exploits, credential harvesting, and the changing nature of cyber attacks. Participants will learn about the RF chain, bruteforce attacks, and the motivations behind cyber attacks. The teaching method includes hands-on talks and presentations from industry experts. This course is intended for decision makers, security specialists, entrepreneurs, developers, and anyone interested in staying updated on cybersecurity trends and threats.
Syllabus
Intro
Team
Stuxnet
The Great World
How did it work
Whats different now
How many devices
Industry was just crap
We carry on
IP camera
People are different
Zeroday exploit
Research
Researchers
The RF chain
Bruteforce attacks
What were they trying to do
Why do they do that
They change the nature
Romantic Arts
Positive Vibes
Credential harvesting
AugustMe
Adobe Flash
Budget Spots
Firewall
Web Support
Campaigns
Detected
Scams
China
Ice water
Kinky
The Party
We are done
How do we have two hunters
Attackers are smarter
New passwords
Taught by
DefCamp