DEFCON 17 Hacking WITH the iPod Touch

Tanki Online Generator Click HERE

Thomas Wilhelm Sr. Network & Information Security Engineer; Adjunct Processor

There has been plenty of news about hacking into the iPod Touch, but what about using the iTouch as a hacking platform? This talk will discuss how to convert the iTouch into a PenTest device, describe available tools, and talk about potential uses for the iTouch as a social engineering tool to provide unauthorized access within a target network. We will also see real-world examples of the device in action against vulnerable systems.

For more information

To download the video

Tanki Online Generator Click HERE