DEF CON 27 Conference - Smea - Adventures In Smart Buttplug Penetration Testing

RnxcPeemHSc/default.jpg

Analysts believe there are currently on the order of 10 billions Internet of Things (IoT) devices out in the wild. Sometimes, these devices find their way up people's butts: as it turns out, cheap and low-power radio-connected chips aren't just great for home automation - they're also changing the way we interact with sex toys. In this talk, we'll dive into the world of teledildonics and see how connected buttplugs' security holds up against a vaguely motivated attacker, finding and exploiting vulnerabilities at every level of the stack, ultimately allowing us to compromise these toys and the devices they connect to.

smea
smea got his start making video games for closed consoles like the Nintendo DS using whatever hacks were available at the time. At some point consoles started getting actual security features and he transitioned from just making homebrew software to actually making the jailbreaks that let people run it. He's best known for his work on the Nintendo 3DS and Wii U but has also done exploitation work against high profile web browsers and virtualization stacks. Now he hacks buttplugs, apparently.

Twitter: @smealum
Github: https://github.com/smealum

RnxcPeemHSc/default.jpg
DEF CON 27 Conference - Smea - Adventures In Smart Buttplug Penetration Testing DEF CON 27 Conference - Smea - Adventures In Smart Buttplug Penetration Testing Reviewed by Anonymous on November 15, 2019 Rating: 5