Event Archive‎ > ‎

You've been Schwimmed and your Hot Tub Hacked...by Haxorcising

Embedded systems are everywhere.  What happens when we stumble across an embedded system that is 'suppose' to be secure and find it is trivially easy to access the system(s), read and/or modify the configuration?  Fun and mayhem for sure.  Can we or anyone else take command and control?  What could we do and how could we use it?  This discussion focuses on a Key Card system that is suppose to control access and yet provides very little security, when it is suppose to do just that.


Michael Gough, www.HackerHurricane.com