<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Presentations on System Overlord</title><link>https://systemoverlord.com/tags/presentations.html</link><description>Recent content in Presentations on System Overlord</description><generator>Hugo</generator><language>en-us</language><managingEditor>david@systemoverlord.com (David Tomaschik)</managingEditor><webMaster>david@systemoverlord.com (David Tomaschik)</webMaster><lastBuildDate>Mon, 16 Apr 2018 12:00:00 +0000</lastBuildDate><atom:link href="https://systemoverlord.com/tags/presentations/index.xml" rel="self" type="application/rss+xml"/><item><title>The IoT Hacker's Toolkit</title><link>https://systemoverlord.com/2018/04/16/the-iot-hackers-toolkit.html</link><pubDate>Mon, 16 Apr 2018 12:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2018/04/16/the-iot-hackers-toolkit.html</guid><description>&lt;p&gt;Today, I&amp;rsquo;m giving a talk entitled &amp;ldquo;The IoT Hacker&amp;rsquo;s Toolkit&amp;rdquo; at
&lt;a href="https://bsidessf.org"&gt;BSides San Francisco&lt;/a&gt;. I thought I&amp;rsquo;d release a companion
blog post to go along with the slide deck. I&amp;rsquo;ll also include a link to the
video once it gets posted online.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;TOC
{:toc}&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;From my talk synopysis:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;IoT and embedded devices provide new challenges to security engineers hoping
to understand and evaluate the attack surface these devices add. From new
interfaces to uncommon operating systems and software, the devices require
both skills and tools just a little outside the normal security assessment.
I&amp;rsquo;ll show both the hardware and software tools, where they overlap and what
capabilities each tool brings to the table. I&amp;rsquo;ll also talk about building the
skillset and getting the hands-on experience with the tools necessary to
perform embedded security assessments.&lt;/p&gt;</description></item></channel></rss>