BEGIN:VCALENDAR
PRODID:-//vBulletin 6//EN
VERSION:2.0
CALSCALE:GREGORIAN
BEGIN:VEVENT
UID:d1fa0ebb-29ea-44e7-9f08-bbf1aa332397
DTSTAMP:20260420T033043Z
SUMMARY:Kicking Devices and Taking CVEs : The Zoomer’s Guide to Hacking S
 hit
DESCRIPTION:Title: Kicking Devices and Taking CVEs : The Zoomer’s Guide t
 o Hacking Shit\n\nDescription:\nDo you ever play iSpy with the smart devic
 es around you and wonder how easy it is to hack shit and get CVEs? In the 
 Zoomer era\, smart devices are extremely accessible\, generally cheap and 
 not very security focused. In this talk\, Sarda (a fellow Zoomer) will wal
 k the audience through the basic methodology\, tooling\, exploitation\, an
 d disclosure process used when hacking an IoT device. This talk will inclu
 de a “livish” demo of the exploitation of 5 CVEs\, including remote co
 de execution and telnet access\, discovered while researching the Tenda AC
 1900 router—which can be chained to provide persistent root shell access
  to the device\n\nSpeaker(s): Sanjana Sarda\n\nLocation: IoT Vlg / IOT Vlg
 \n\nDiscord: https://discord.com/channels/708208267699945503/7327345656046
 55114\n\nEvent starts: 2020-08-08 12:30 (12:30 PM) PDT (UTC -07:00)\n\nEve
 nt ends: 2020-08-08 13:15 (01:15 PM) PDT (UTC -07:00)\n\nFor the most up-t
 o-date information\, please either visit https://info.defcon.org\, or use 
 HackerTracker\, which is available for iOS and Android. This is an automat
 ed message\, and this data was last modified 2020-08-08T03:05 (UTC).
URL:https://forum.defcon.org/node/234800
DTSTART:20200808T203000Z
DTEND:20200808T211501Z
LOCATION:IoT Vlg / IOT Vlg
END:VEVENT
END:VCALENDAR
