YoVDO

Alarm.DISARM - Remotely Exploiting & Disarming Popular Physical Security System from Public Internet

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Ethical Hacking Courses Reverse Engineering Courses Network Protocols Courses Shellcode Courses

Course Description

Overview

Explore a Black Hat conference talk that delves into remotely exploiting and disarming a popular physical security system from the public internet. Learn about two remote code execution vulnerabilities (CVE-2020-25189 and CVE-2020-25185) discovered in a Paradox security system. Follow the presenter's journey through reverse engineering, network protocol analysis, and vulnerability discovery in the IP150 Login Page. Gain insights into developing ROP chain solutions and crafting shellcode for memory dumping and port switching. Understand the real-world application of hacking techniques often depicted in movies, as the talk breaks down the process of remotely disabling alarms for potential security breaches.

Syllabus

Intro
Lab equipment
Step 1 - Firmware updates
Reverse Engineering
Network Protocol
Packet Header
Looking for vulnerabilities - IP150 Login Page
CVE-2020-25189
Solution - ROP Chain
Shellcode [1] - memory dumper
Shellcode [2] - Switch Ports


Taught by

Black Hat

Related Courses

Rootkits and Stealth Apps: Creating & Revealing 2.0 HACKING
Udemy
MacOS Dylib Injection through Mach-O Binary Manipulation
Malware Unicorn via Independent
ChatGPT for Cybersecurity
HackerSploit via YouTube
Browser Exploitation - Max Zinkus
White Hat Cal Poly via YouTube
ARM Assembly and Shellcode Basics - Workshop
44CON Information Security Conference via YouTube