2. IP communications: a preferred attack vector for remote attacks
2.1 Main vulnerabilities enabling remote attacks
As connected objects are by their very nature connected, and the vast majority of communications take place via TCP/IP , it's only natural to study possible attacks via this medium.
...Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
IP communications: a preferred attack vector for remote attacks
Article included in this offer
"Industry of the future"
(
103 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
- (1) - Black Hat 2019 IoT hacking training sessions. - https://www.blackhat.com/us-19/training/schedule/#track/iot
- (2) - KOLIAS (C.), KAMBOURAKIS (G.), STAVROU (A.), VOAS (J.) -...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!