SQL Injection to MIPS Overflows - Rooting SOHO Routers
Offered By: Black Hat via YouTube
Course Description
Overview
Explore an advanced exploitation technique in this 45-minute conference talk that demonstrates how SQL injection can be leveraged to exploit hidden buffer overflows, resulting in remote root access to Netgear wireless routers. Learn how the same SQL injection vulnerability can be exploited to extract sensitive files, including plain-text passwords, from router file systems. Follow along as the presenter guides you through the vulnerability discovery and exploitation process, culminating in a live demonstration. Gain valuable insights into effective investigation and exploitation techniques applicable to analyzing SOHO routers and other embedded devices, making this presentation essential for security researchers and penetration testers interested in embedded system vulnerabilities.
Syllabus
Black Hat USA 2012 - SQL Injection to MIPS Overflows: Rooting SOHO Routers
Taught by
Black Hat
Related Courses
Software Design Threats and MitigationsUniversity of Colorado System via Coursera Information Security - 5 - Secure Systems Engineering
Indian Institute of Technology Madras via Swayam Unlocking Information Security I: From Cryptography to Buffer Overflows
Tel Aviv University via edX Unlocking Information Security
Tel Aviv University via edX Buffer Overflow Exploits (Arabic) | OSCP Preparation
Udemy