Cracking into Embedded Devices and Beyond - The presentation covers cracking into embedded devices by exploiting vulnerabilities present on default software running on the target device.
b17e69cf657c3562c5c8244483120184a84061a080f2c346f2373b88d8170d3e