Butt Plug Hacking! Real Penetration Testing – DEF CON 27
Adventures In Smart Buttplug Penetration (testing) smea Analysts believe there are currently on the order of 10 billions Internet of Things (IoT) devices out in the wild. Sometimes, these devices find their way up people's butts: as it turns out, cheap and low-power radio-connected chips aren't just great for home automation - they're also changing the way we interact with sex toys. In this talk, we'll dive into the world of teledildonics and see how connected buttplugs' security holds up against a vaguely motivated attacker, finding and exploiting vulnerabilities at every level of the stack, ultimately allowing us to compromise these toys and the devices they connect to. smea smea got his start making video games for closed consoles like the Nintendo DS using whatever hacks were available at the time. At some point consoles started getting actual security features and he transitioned from just making homebrew software to actually making the jailbreaks that let people run it. He's best known for his work on the Nintendo 3DS and Wii U but has also done exploitation work against high profile web browsers and virtualization stacks. Now he hacks buttplugs, apparently. Twitter: @smealum Github: https://ift.tt/3pgfKjV Defcon 27 Def Con 27 Link to Description: https://ift.tt/3o2KwgV Follow my Instagram at: https://ift.tt/34rEJGa & Check out my app development company I started at: http://Introdite.com Check out my phone repair company I started to get any repairs done go to: https://ift.tt/3I6U825 Subscribe, Like, & Share if you enjoyed this video or learned something & comment below what you found interesting!
via YouTube https://www.youtube.com/watch?v=CsQ2VWEfduM
Adventures In Smart Buttplug Penetration (testing) smea Analysts believe there are currently on the order of 10 billions Internet of Things (IoT) devices out in the wild. Sometimes, these devices find their way up people's butts: as it turns out, cheap and low-power radio-connected chips aren't just great for home automation - they're also changing the way we interact with sex toys. In this talk, we'll dive into the world of teledildonics and see how connected buttplugs' security holds up against a vaguely motivated attacker, finding and exploiting vulnerabilities at every level of the stack, ultimately allowing us to compromise these toys and the devices they connect to. smea smea got his start making video games for closed consoles like the Nintendo DS using whatever hacks were available at the time. At some point consoles started getting actual security features and he transitioned from just making homebrew software to actually making the jailbreaks that let people run it. He's best known for his work on the Nintendo 3DS and Wii U but has also done exploitation work against high profile web browsers and virtualization stacks. Now he hacks buttplugs, apparently. Twitter: @smealum Github: https://ift.tt/3pgfKjV Defcon 27 Def Con 27 Link to Description: https://ift.tt/3o2KwgV Follow my Instagram at: https://ift.tt/34rEJGa & Check out my app development company I started at: http://Introdite.com Check out my phone repair company I started to get any repairs done go to: https://ift.tt/3I6U825 Subscribe, Like, & Share if you enjoyed this video or learned something & comment below what you found interesting!
via YouTube https://www.youtube.com/watch?v=CsQ2VWEfduM
Comments
Post a Comment