YoVDO

What The Fax?

Offered By: Cooper via YouTube

Tags

Hack.lu Courses Cybersecurity Courses Ethical Hacking Courses

Course Description

Overview

Explore the security vulnerabilities of fax machines in this 45-minute conference talk from Hack.lu 2018. Delve into the history of fax technology and its surprising persistence in modern times. Examine the security implications of fax usage and learn about potential attack vectors. Follow along as the speakers demonstrate debugging techniques for hardware and software components. Discover the intricacies of JPEG compression and its role in exploiting fax vulnerabilities. Analyze real-world examples, including CVE-2018-5924 and CVE-2018-5925, and understand mitigation bypass techniques. Gain valuable insights into the unexpected security risks posed by this seemingly outdated technology and consider the broader implications for network security.

Syllabus

Intro
FAXHistory
Back To The Future
The Security View
FAXAttack
How can we Debug it?
Breaking HW
Sections
WhatISThis?!
Let's Take A Look
APattern?!
DifferentAngle
The MissingLink
Softdisk
TheUndebuggable
Lucky Break
Debugging Challenges
Scout
Vulnerability
JPEG
Mitigation Bypass
CVE-2018-5924 CVE-2018-5925
Conclusions


Taught by

Cooper

Related Courses

Modern Pentest Tricks for Faster, Wider, Greater Engagements
Cooper via YouTube
Take Your Path Normalization Off and Pop 0days Out
Cooper via YouTube
Finding the Best TI Provider for a Specific Purpose
Cooper via YouTube
Make ARM Shellcode Great Again
Cooper via YouTube
Digital Safety for Politically Vulnerable Organizations
Cooper via YouTube