Session
Agent Smith Gets Hardware: Autonomous IoT Hacking From Debug Port to Cloud API
Last year, Agent Smith turned rogue in software. This year, he got physical access.
In this session, we take a cheap off-the-shelf IoT device and let AI agents loose on it. No manual hacking, no memorized commands, no Kali cheat sheets. Using MCP-driven tool orchestration, the agents autonomously probe the device's hardware debug interface, extract firmware secrets, and intercept its cloud traffic through a rogue WiFi access point. Multiple attack vectors, one device, zero human intervention.
This is not a theoretical exercise. Every demo runs on a Raspberry Pi with open-source tools, and the agents make their own decisions about what to probe, what to extract, and what to flag. We will see what they finds, what they miss, and what happens when a device actually fights back.
Whether you build IoT products, secure enterprise networks, or just want to know what your smart devices are doing behind your back: this session will make you uncomfortable.
Good.
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top