YoVDO

The Route to Success: Hacking a Router to Its End of Life

Offered By: HackMiami via YouTube

Tags

IoT security Courses Embedded Systems Courses Reverse Engineering Courses Penetration Testing Courses Bug Bounty Courses Exploit Development Courses Firmware Analysis Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the process of hacking a Trendnet travel router to its end of life in this 47-minute conference talk by Austin Turecek at HackMiami. Dive into the methodology, tools, and techniques used to discover and exploit multiple chaining vulnerabilities that led to the complete compromise of the device. Learn about both the technical and non-technical aspects of vulnerability hunting, suitable for newcomers and experienced hackers alike. Follow the entire hunting process from start to finish, including the challenges and successes encountered during hacking and reporting. Gain insights on how to improve focus and increase success in future vulnerability hunts. Benefit from Austin Turecek's diverse background in application penetration testing, IoT, embedded systems, incident response, and malware analysis as he shares his experiences and lessons learned from this router hacking adventure.

Syllabus

The Route(R) To Success: Hacking A Router To Its End Of Life - Austin Turecek


Taught by

HackMiami

Related Courses

Embedded Systems - Shape The World: Microcontroller Input/Output
The University of Texas at Austin via edX
Model Checking
Chennai Mathematical Institute via Swayam
Introduction to the Internet of Things and Embedded Systems
University of California, Irvine via Coursera
Sistemas embebidos: Aplicaciones con Arduino
Universidad Nacional Autónoma de México via Coursera
Quantitative Formal Modeling and Worst-Case Performance Analysis
EIT Digital via Coursera