YoVDO

Assessing IoT Surveillance Arlo

Offered By: YouTube

Tags

DerbyCon Courses Ethical Hacking Courses IoT security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the vulnerabilities and security implications of IoT surveillance systems in this 24-minute conference talk from Derbycon 2019. Delve into the assessment of Arlo devices, examining their setup, components, and functionality. Uncover critical vulnerabilities, including CVE-2016-10115, and learn about initial scans, attack surfaces, and device teardown processes. Gain insights into connecting to serial interfaces, booting procedures, and authentication requirements. Discover methods for finding sensitive information, conducting config reconnaissance, and identifying running services. Investigate insufficient UART protections, plaintext data exposure, and networking misconfigurations. Understand camera snooping techniques, decryption routines, and encryption keys. Follow a timeline summary of the assessment and explore the implications of SIP interfaces in IoT surveillance systems.

Syllabus

Intro
Overview of Past Surveillance Systems
Why Arlo?
Device Setup
Components
Functionality
CVE-2016-10115
Initial Scans and Attack Surface
Device Teardown
Connecting to Serial
Booting
Authentication Required
Bootloader
CFE Save Command
Finding Goodies
Config Recon
Service Running
Primary Services
Insufficient UART Protections
Plaintext Goodies
Networking Misconfiguration
Camera Snooping
Decryption Routines and Keys
Timeline Summary
The damn SIP interface
Final Thoughts


Related Courses

Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax
MSc Cyber Security
Coventry University via FutureLearn
Network Security - Introduction to Network Security
New York University (NYU) via edX
Network Security - Advanced Topics
New York University (NYU) via edX