Introduction

What?

Using screencasts as PoC.

Why?

If you can see it being hacked, you can hack it.

How?