Star 0

Abstract

What does it take to hack into someone's home? What are the attack vectors? Entry points? These are questions I wanted to answer. We often do everything we can to protect our endpoints from threats, but are there other ways to attack someone? I decided to find out and within 20 minutes I was able to turn my devices into nodes in botnets to perform advanced attacks.