House Intercoms Attacks - When Frontdoors Become Backdoors
Offered By: Cooper via YouTube
Course Description
Overview
Syllabus
Intro
Intercoms today
Human curiosity...
Context
Different types of intercoms
Numeric intercoms: simplified architecture
Network architecture with M2M
Different brands market
State Of the Art: tools
GSM and GPRS: authentication
GSM and GPRS: Handover
3G/4G: advantages
Mobile interception: signal attraction A User Equipment connects to the closest Base Station
Jamming is generally basic...
GSM Lab setup: for interception
Intercom setup: configuration
First impressions
Attacker steps to open the door
To trap the intercom
What's next? Let's backdoor it!
Call premium rate numbers
Attack vectors with M2M Intercoms
Bruteforce accounts
Enumerated accounts
Attack scenarios
Reverse look-up directories
Connecting to the M2M network
Traceroute in the M2M virtual network
Conclusion
Security recommendations for M2M solutions
Taught by
Cooper
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network