These days IoT has added more custom mitigation to protect its software, but still there are bugs to bypass by disabling the mitigation. While IoT camera exploration is still new - you can exploit to get the shell, but it's still a long way to fully compromise it.This talk includes ways of reversing the kernel, patching to bypass the custom kernel's mitigation, bypass authentication, remote code execution, then making a camera loop a video to steal the stream without being detected - just like in the movies!