Joe Hopper
Live Hack: Demonstrating Common IoT Security Weaknesses
Status: Available NowHow would hackers attack your IoT device? Joe Hopper, Principal Security Consultant at Fracture Labs, will demonstrate several complex hacks against off-the-shelf IoT devices to shed light on the design and implementation weaknesses seen across the industry. He will walk through common attacks such as: finding and connecting to hidden serial consoles, boot process hijacking, memory analysis, firmware extraction, password cracking, and more to gain unauthorized access to IoT devices and customer information.
By using the same approach hackers use against your devices, you will walk away with a better understanding of where and how you need to tighten security controls.
Live Q&A - Live Hack: Demonstrating Common IoT Security Weaknesses
Status: Available NowLive Q&A with Joe Hopper for the talk titled Live Hack: Demonstrating Common IoT Security Weaknesses
Live Hack: Demonstrating Common IoT Security Weaknesses
Status: Available NowHow would hackers attack your IoT device? Joe Hopper, Principal Security Consultant at Fracture Labs, will demonstrate several complex hacks against off-the-shelf IoT devices to shed light on the design and implementation weaknesses seen across the industry. He will walk through common attacks such as: finding and connecting to hidden serial consoles, boot process hijacking, memory analysis, firmware extraction, password cracking, and more to gain unauthorized access to IoT devices and customer information.
By using the same approach hackers use against your devices, you will walk away with a better understanding of where and how you need to tighten security controls.
IoT Hacks: Behind the Scenes (2020)
Status: Available NowNews reports of IoT breaches are now commonplace, with manufacturers often blaming end-user misconfigurations or 'sophisticated attacks'. This implies the victim customers and organizations were simply unlucky, but have you ever wondered exactly how these hacks occurred and what could have been done to prevent them?
Joe Hopper, a professional hacker for the Fracture Labs technology security company, will walk you through:
- How hackers target the victim devices
- How vulnerabilities are discovered
- How the weaknesses are exploited
- What could have been done to prevent the breaches in the first place