Hardware Slashing, Smashing, and Reconstructing for Root Access
Offered By: YouTube
Course Description
Overview
Explore hardware hacking techniques for gaining root access in this 47-minute conference talk from Derbycon 2018. Dive into the world of slashing, smashing, and reconstructing hardware components as Deral Heiland demonstrates methods to bypass security measures and obtain elevated privileges. Learn about the tools, techniques, and potential risks associated with physical device manipulation for penetration testing and security research purposes.
Syllabus
Track 2 06 Hardware Slashing Smashing and Reconstructing for Root access Deral Heiland
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network