Internet Of Things (IoT) vulnerability scope

Millions of embedded internet-enabled devices worldwide are providing an incredibly rich set of data and accessibility for firms and users.

Are you an IoT expert? We’re looking for you!

nasa-Q1p7bh3SHj8-unsplash

We are currently looking for the following items in IoT:

  • Code execution
  • Command execution
  • Authentication bypass
  • Cross-site scripting (XSS) vulnerability leading to RCE
  • Directory traversal vulnerability

Found something not on this list? We still want to buy it!