YoVDO

Breaking Bad - Stealing Patient Data Through Medical Devices

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Reverse Engineering Courses Network Analysis Courses Port Scanning Courses

Course Description

Overview

Explore the risks associated with connected healthcare devices in this Black Hat conference talk. Delve into the benefits and challenges of adopting IoT for medical devices, examining current exposure, common communication channels, and interconnectivity approaches with critical components. Gain insights into potential vulnerabilities through case studies of digital pens and IV infusion pumps, including workflow analysis, default account exploitation, and reverse engineering techniques. Learn about the implications of compromised medical data compared to financial information, and understand the importance of securing the healthcare IoT ecosystem. Discover practical examples of attack surfaces, troubleshooting methods, and potential security flaws in medical device networks.

Syllabus

Introduction
Sara Barrett
Agenda
Disclaimer
What are connected medical devices
Categories of connected medical devices
Inhouse medical devices
Information loop
Ecosystem
Why connected medical devices
Challenges of connected medical devices
Serial to Ethernet converters
Attack surface
Metric
Financial vs Medical Data
Case Studies
Digital Pen
Workflow
Default Accounts
Use Case Scenario
Observations
Analysis
Reverse Engineering
Port Scan
Prescriptions
Summary
IV Infusion Pump
Pump Server
Lab Setup
Initial observations
Troubleshooting
eBay
Exporting Network Settings
More Observations
Initial Packet
Master Drug List
Conclusion


Taught by

Black Hat

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network