Marthy Vanhoef has given a session at the conference 34c3 where he greatly explains more details about the different type of attacks.
Furthermore, he has published a URL where a set of scripts is made available, which allows to verify if a given device is vulnerable or not.
This PR adds corresponding links to these resources.
Marthy Vanhoef has given a session at the conference 34c3 where he greatly explains more details about the different type of attacks. Furthermore, he has published a URL where a set of scripts is made available, which allows to verify if a given device is vulnerable or not.
This PR adds corresponding links to these resources.