House Intercoms Attacks - When Frontdoors Become Backdoors
Offered By: Cooper via YouTube
Course Description
Overview
Syllabus
Intro
Intercoms today
Human curiosity...
Context
Different types of intercoms
Numeric intercoms: simplified architecture
Network architecture with M2M
Different brands market
State Of the Art: tools
GSM and GPRS: authentication
GSM and GPRS: Handover
3G/4G: advantages
Mobile interception: signal attraction A User Equipment connects to the closest Base Station
Jamming is generally basic...
GSM Lab setup: for interception
Intercom setup: configuration
First impressions
Attacker steps to open the door
To trap the intercom
What's next? Let's backdoor it!
Call premium rate numbers
Attack vectors with M2M Intercoms
Bruteforce accounts
Enumerated accounts
Attack scenarios
Reverse look-up directories
Connecting to the M2M network
Traceroute in the M2M virtual network
Conclusion
Security recommendations for M2M solutions
Taught by
Cooper
Related Courses
Modern Pentest Tricks for Faster, Wider, Greater EngagementsCooper via YouTube Take Your Path Normalization Off and Pop 0days Out
Cooper via YouTube Finding the Best TI Provider for a Specific Purpose
Cooper via YouTube Make ARM Shellcode Great Again
Cooper via YouTube Digital Safety for Politically Vulnerable Organizations
Cooper via YouTube