Published On Aug 20, 2024
In this talk, you will learn about how we found the firmware decryption key, finished setting up the debugging environment, and finally, how we created a shell on the device so that we can reset it and use it in the future in our cyber-range.
Watch the talk by Jens Nielsen, Senior Security Researcher at ICSRange.
show more