Embedded systems hacking

Presented at DEF CON 7 (1999), July 11, 1999, 3 p.m. (50 minutes)

Embedded systems can often go where the average hacker cannot. They don't reside on the server to be detected by a vigilant sysop, nor do they need the dedicated resources of a computer. But no one in the hacking community seems to be taking advantage of this arena. This will cover the possible uses for a custom embedded system and how to go about creating it.


Presenters:

Links:

Similar Presentations: