YoVDO

Metasploit Hardware Bridge Hacking

Offered By: WEareTROOPERS via YouTube

Tags

TROOPERS Courses Ethical Hacking Courses Metasploit Courses IoT security Courses Hardware Hacking Courses

Course Description

Overview

Explore hardware hacking techniques using the Metasploit Hardware Bridge in this conference talk from TROOPERS17. Learn how to leverage this powerful tool for IoT security testing and vulnerability assessment. Gain insights into the latest developments in hardware exploitation and discover practical applications for securing connected devices. Delve into the world of IoT security and enhance your skills in identifying and mitigating hardware-based vulnerabilities.

Syllabus

TR17 - Metasploit Hardware Bridge Hacking - Craig Smith


Taught by

WEareTROOPERS

Related Courses

Modmob Tools - Home Made Tools to Test Mobile Devices and Monitor Networks
WEareTROOPERS via YouTube
Microsoft IT - Secure Journey to IPv6-Only
WEareTROOPERS via YouTube
Introducing Faction - A Modern, Powerful, Multiplayer C2 Framework
WEareTROOPERS via YouTube
A Diet of Poisoned Fruit - Designing Implants and OT Payloads for ICS Embedded Devices
WEareTROOPERS via YouTube
Hardware Side Channel Attacks on the Cheapest
WEareTROOPERS via YouTube