A vast amphibious wilderness of swamp and forest
Identify, assess, and exploit basic and complex security mechanisms in IoT devices.

IoT threat landscape
Network hacking
Hardware hacking
Radio hacking
Targeting the ecosystem

Identify, assess, and exploit basic and complex security mechanisms in IoT devices.
IoT threat landscape
Network hacking
Hardware hacking
Radio hacking
Targeting the ecosystem