Action | Key |
---|---|
Play / Pause | K or space |
Mute / Unmute | M |
Toggle fullscreen mode | F |
Select next subtitles | C |
Select next audio track | A |
Toggle automatic slides maximization | V |
Seek 5s backward | left arrow |
Seek 5s forward | right arrow |
Seek 10s backward | shift + left arrow or J |
Seek 10s forward | shift + right arrow or L |
Seek 60s backward | control + left arrow |
Seek 60s forward | control + right arrow |
Seek 1 frame backward | alt + left arrow |
Seek 1 frame forward | alt + right arrow |
Decrease volume | shift + down arrow |
Increase volume | shift + up arrow |
Decrease playback rate | < |
Increase playback rate | > |
Seek to end | end |
Seek to beginning | beginning |
You can use an external player to play this stream (like VLC).
HLS video streamWhat if we teach a computer to discover and classify every possible exposed device on the Internet and determine what are the most valuable targets, instead of relying on Shodan and a bunch of random keywords ? Obviously, we would have a pretty nice picture of what type of devices are connected to the Internet without prior knowledge.
In this presentation, we will introduce some major concepts in Machine Learning such as datasets, supervised and unsupervised learning, and teach the audience how to create a scanner/classifier based on opensource tools and frameworks. We will go through the whole process covering data collection, data pre-processing, datasets building, automated classification process and post-processing.
We will demonstrate the effectiveness of this scanner with multiple examples of what we found, some statistics about the major connected devices vendors seen by our bot, and of course how to weaponize it and turn it into a p0wning machine !
Damien Cauquil (digital.security)
When subscribed to notifications, an email will be sent to you for all added annotations.
Your user account has no email address.