An embedded device in our serial network exploited a misconfiguration which resulted in the compromisation of several of our slave devices in it, leaving the base camp exposed to intruders. We must find what alterations the device did over the network in order to revert them before its too late.
Action | Rating | Author team |
---|---|---|
Read writeup |
not rated
|
Class3E |
Read writeup |
not rated
|
ISwearIGoogledIt |