YoVDO

What The Fax?

Offered By: Cooper via YouTube

Tags

Hack.lu Courses Cybersecurity Courses Ethical Hacking Courses

Course Description

Overview

Explore the security vulnerabilities of fax machines in this 45-minute conference talk from Hack.lu 2018. Delve into the history of fax technology and its surprising persistence in modern times. Examine the security implications of fax usage and learn about potential attack vectors. Follow along as the speakers demonstrate debugging techniques for hardware and software components. Discover the intricacies of JPEG compression and its role in exploiting fax vulnerabilities. Analyze real-world examples, including CVE-2018-5924 and CVE-2018-5925, and understand mitigation bypass techniques. Gain valuable insights into the unexpected security risks posed by this seemingly outdated technology and consider the broader implications for network security.

Syllabus

Intro
FAXHistory
Back To The Future
The Security View
FAXAttack
How can we Debug it?
Breaking HW
Sections
WhatISThis?!
Let's Take A Look
APattern?!
DifferentAngle
The MissingLink
Softdisk
TheUndebuggable
Lucky Break
Debugging Challenges
Scout
Vulnerability
JPEG
Mitigation Bypass
CVE-2018-5924 CVE-2018-5925
Conclusions


Taught by

Cooper

Related Courses

Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax
MSc Cyber Security
Coventry University via FutureLearn
Network Security - Introduction to Network Security
New York University (NYU) via edX
Network Security - Advanced Topics
New York University (NYU) via edX