YoVDO

SQL Injection to MIPS Overflows - Rooting SOHO Routers

Offered By: Black Hat via YouTube

Tags

Black Hat Courses SQL Injection Courses Buffer Overflow Courses

Course Description

Overview

Explore an advanced exploitation technique in this 45-minute conference talk that demonstrates how SQL injection can be leveraged to exploit hidden buffer overflows, resulting in remote root access to Netgear wireless routers. Learn how the same SQL injection vulnerability can be exploited to extract sensitive files, including plain-text passwords, from router file systems. Follow along as the presenter guides you through the vulnerability discovery and exploitation process, culminating in a live demonstration. Gain valuable insights into effective investigation and exploitation techniques applicable to analyzing SOHO routers and other embedded devices, making this presentation essential for security researchers and penetration testers interested in embedded system vulnerabilities.

Syllabus

Black Hat USA 2012 - SQL Injection to MIPS Overflows: Rooting SOHO Routers


Taught by

Black Hat

Related Courses

Software Design Threats and Mitigations
University of Colorado System via Coursera
Information Security - 5 - Secure Systems Engineering
Indian Institute of Technology Madras via Swayam
Unlocking Information Security I: From Cryptography to Buffer Overflows
Tel Aviv University via edX
Unlocking Information Security
Tel Aviv University via edX
Buffer Overflow Exploits (Arabic) | OSCP Preparation
Udemy