by Brad Dixon | Aug 6, 2016 | Exploits, IOT, Labs, Techniques
One of the most critical issues that we look for when we assess an embedded/IoT device is secrets that are shared across the device population. Usually, finding these secrets involves gaining full access to our own device in order to find out how other devices may be...