Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Uploaded on Jan 16, 2011
Speaker: Thomas Wilhelm Sr. Network & Information Security Engineer; Adjunct Processor
There has been plenty of news about hacking into the iPod Touch, but what about using the iTouch as a hacking platform? This talk will discuss how to convert the iTouch into a PenTest device, describe available tools, and talk about potential uses for the iTouch as a social engineering tool to provide unauthorized access within a target network. We will also see real-world examples of the device in action against vulnerable systems.