Page 90 - Cyber Warnings
P. 90







Hacking the projector at a cyber event


By Milica D. Djekic


You would probably be present or hear about some cybersecurity events where some of the
attendees hacked the conference projector using a mobile device.

Such a happening may seem as so attractive to many and you may be wondering how those
guys could make that spectacular trick.

Through this article we would talk about such an occurrence and try to explain how it’s possible
to make such a gag and cause everyone getting excited about your skills at that moment.

It’s well-known that the IT security conferences would deal with a lot of geeks or at least people
being in love with their computers, networks or mobile systems. As everyone knows, for a cyber
defense – it’s crucially important to understand the hacking for a reason it’s the only way to
prevent such a threat.

The cybersecurity folks are
supposed to be equally good as
the bad guys or even better in
order to protect the certain IT
asset.

As we’ve talked through this
article – sometimes the cyber
experts would try to make a gag
and they would use some of the
cyber defense events to cause a
show alive. You may be
wondering what they would do
for a real.

So, let’s try to explain how it’s possible to obtain something that cool as hacking the projector is.
The standard scenario would be as follows. You would come at some cyber defense event with
your laptop, tablet or another mobile device and you would try to login to the conference’s
network.

Your host would give you a permission believing that you need the internet to check out your e-
mail and social media accounts only. Well, everything would appear as somehow usual and
unsuspicious – right?


90 Cyber Warnings E-Magazine February 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   85   86   87   88   89   90   91   92   93   94   95