ToorCon 15 (2013) - Rickrolling your neighbors with Google Chromecast
This presentation will demonstrate how to hijack a Google Chromecast on any network to play videos of your choosing. Let no TV be safe.
Bishop Fox Breach Controls Readiness Assessment Methodology
Download our methodology document to learn how we approach our Breach Controls Readiness Assessments.
The Offensive Security Blueprint for Technology & Software
Cosmos Datasheet
Learn how Cosmos combines attack surface management with expert-driven penetration testing to help security teams identify and remediate dangerous exposures before attackers can exploit them. |
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.