Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

DEF CON 18 - Jackpotting Automated Teller Machines Redux

 

Rating :

 

Comments

 
  • Kalbuainain
    Kalbuainain at December 03,2017
    The War Kitteh and the Denial of Service Dog – while innovation has been a driving force for hackers, they have integrated creativity into their activities. Notably, the use of animals in computer programmers has introduced a unique approach to establishing hardware penetration testing. Indeed, this illustrates that there are different ways of creating hacking systems.
  • Jalketbi
    Jalketbi at December 05,2017
    This presentation talks about some basic ideas about how to use hardware specifically designed for penetration testing. It is a unique method of using animals. I would never have thought of using animals in such a way.
  • cmarti
    cmarti at December 06,2017
    DEF CON 22 - Weaponizing Your Pets: The War Kitteh and the Denial of Service Dog Big data, APT, Cloud . Gumstick, Cotton candy stick are some of the things you can do.
  • SarahDavis
    SarahDavis at December 11,2017
    This is so cool! I know that it was frustrating to have to do all the troubleshooting but I know so many people who love the cat tracker and the dos dog is hilarious. This was so enjoyable to watch.
  • mperdom4
    mperdom4 at December 12,2017
    This was a very enjoying video. The speaker did not lose my attention at all, he kept me engaged waiting for him to get through his whole story. It's a good depiction of the process that goes into developing a working product. His pictures of soldering has really emphasized to me that soldering is not fun at all.
    • «
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11
    • 12
    • 13
    • 14
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved